Dependency-Check is an open source tool performing a best effort analysis of 3rd party dependencies; false positives and false negatives may exist in the analysis performed by the tool. Use of the tool and the reporting provided constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to the analysis or its use. Any use of the tool and the reporting provided is at the user’s risk. In no event shall the copyright holder or OWASP be held liable for any damages whatsoever arising out of or in connection with the use of this tool, the analysis performed, or the resulting report.
* indicates the dependency has a known exploited vulnerability
File Path: C:\Windows\System32\07409496-a423-4a3e-b620-2cfb01a9318d_HyperV-ComputeNetwork.dll
MD5: afedb18ee2e645718b96fbf8e374ff12
SHA1: 72743d1a566070f543b76e428fcfba864e16c7e4
SHA256:4f00a9d36a0aa124d5864a26454ca1c9cdfc3beb9a069a0a88bfe0fe33a3ad0d
File Path: C:\Windows\System32\69fe178f-26e7-43a9-aa7d-2b616b672dde_eventlogservice.dll
MD5: aa22aca4af887a2c3859f19b037d044c
SHA1: 654ed07b77b07d6a31395baddd9f74c1ef29028e
SHA256:f1a674ef9154775bf524c41d3364c867feba50162791dca851597147d92d172d
File Path: C:\Windows\System32\6bea57fb-8dfb-4177-9ae8-42e8b3529933_RuntimeDeviceInstall.dll
MD5: 8fc840b45813cc5c2a07e3630b62db34
SHA1: 4396cae06e74d0c26c10cb76dc898dd5974546d1
SHA256:c407a7d3920dfac893f61a6205b910dbbf1aa2a013fdde8137e5614cfb14803c
File Path: C:\Windows\System32\ACPBackgroundManagerPolicy.dll
MD5: c32ff21f9df3ea9cb51a7050eddf7e41
SHA1: f923dbb666bbd75b4d3140ae6e670ea324279982
SHA256:2c52624c06f14082d05622aca1e77aa3dde245aaa7ceb83945fa9bef1cf4d1f5
Description:
AGS
File Path: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_9cf4db1a1fd1b22d\AGS.dll
MD5: dbaea6340562f967cd14155e53ab24aa
SHA1: 11ae6955bd77ef38fb1ecfd076e95bb46e7b8c71
SHA256:e96e79e74c9aa0a13e960071ff39564516d61f408cf5787dd5cf3443d1f7e57e
Description:
AGS.Core
File Path: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_9cf4db1a1fd1b22d\AGSOfflinePackage.zip\Libs\AGS.Core.dll
MD5: c34262c1a1443256ccca17dd444c69ae
SHA1: 5c31618c745c0c9dfaa159fa37f1e0f0f5875777
SHA256:340e24299ace194f76d5ca85a144620171b7eebe21da03e33fbb309a3010c7d6
Description:
AGSGamesDetection
File Path: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_9cf4db1a1fd1b22d\AGSOfflinePackage.zip\Detector\Detector.dll
MD5: 4984074711a20298e8cd5cd819f84a21
SHA1: f8a9c1c8df9d70debc77c6d92e9bfe4acf486715
SHA256:2256585d3adffb2349f80d49f6a017bf00fabced116639cd129ab0422f98c0f3
Description:
LiteDB LiteDB - A lightweight embedded .NET NoSQL document store in a single datafile
File Path: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_9cf4db1a1fd1b22d\AGSOfflinePackage.zip\Libs\LiteDB.dll
MD5: 25b242d00c6c32e1f437eb2064ea2e29
SHA1: 3712bd78c80a237dd804ec77c64498defde12e94
SHA256:e72acddf47586bc0999d598e3bd125a254bb6f4ae151c076993304f6e31fbbed
LiteDB is a small, fast and lightweight .NET NoSQL embedded database. Versions prior to 5.0.13 are subject to Deserialization of Untrusted Data. LiteDB uses a special field in JSON documents to cast different types from `BsonDocument` to POCO classes. When instances of an object are not the same of class, `BsonMapper` use a special field `_type` string info with full class name with assembly to be loaded and fit into your model. If your end-user can send to your app a plain JSON string, deserialization can load an unsafe object to fit into your model. This issue is patched in version 5.0.13 with some basic fixes to avoid this, but is not 100% guaranteed when using `Object` type. The next major version will contain an allow-list to select what kind of Assembly can be loaded. Workarounds are detailed in the vendor advisory.CWE-502 Deserialization of Untrusted Data
Vulnerable Software & Versions:
Description:
Json.NET Json.NET is a popular high-performance JSON framework for .NET
File Path: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_9cf4db1a1fd1b22d\AGSOfflinePackage.zip\Libs\Newtonsoft.Json.dll
MD5: 4df6c8781e70c3a4912b5be796e6d337
SHA1: cbc510520fcd85dbc1c82b02e82040702aca9b79
SHA256:3598cccad5b535fea6f93662107a4183bfd6167bf1d0f80260436093edc2e3af
Newtonsoft.Json before version 13.0.1 is affected by a mishandling of exceptional conditions vulnerability. Crafted data that is passed to the JsonConvert.DeserializeObject method may trigger a StackOverflow exception resulting in denial of service. Depending on the usage of the library, an unauthenticated and remote attacker may be able to cause the denial of service condition.CWE-755 Improper Handling of Exceptional Conditions
Vulnerable Software & Versions:
File Path: C:\Windows\System32\AJRouter.dll
MD5: 526fe18db976d9a1ae19fbc53fa690b1
SHA1: 8a078f772de666278000b842eaef09a4a3f3857d
SHA256:4e2623243a9bb61f7211e591c24edb70b07974a7fa21e3f14c683f27e975777f
File Path: C:\Windows\System32\APHostClient.dll
MD5: 37fe15dec8c0476d43d3dbeeccaa88ec
SHA1: 8d94cb8d160c8d2e369210e4c369928a93600025
SHA256:de2d24fbed7cc00aec6d81310aabc96b37d8016a85d7cab193b4c12447e8e436
File Path: C:\Windows\System32\APHostRes.dll
MD5: 320bbe0b9bf7917a84fb70b95d37b3de
SHA1: 749bb2739cc74853f0257e3bddbc49260d9298d4
SHA256:99981098f61ce6f5ab26f7ab1fbdf4efa3f00ff2a4b6d95e00431631945058d8
File Path: C:\Windows\System32\APHostService.dll
MD5: cf9a856741010ef1a0610c4699912f85
SHA1: 9bd7494bfd4cd927764472b907d3dd99cdf3372a
SHA256:7dba4f1fae4182544f9fc0d1cf1e755a2ec76664835ad6de9792994f435f89bf
File Path: C:\Windows\System32\downlevel\API-MS-Win-Core-Heap-Obsolete-L1-1-0.dll
MD5: d65714c72b6363014f8ede9d56f9b288
SHA1: 6bb2d70d1f6c1c06014b7cf65460d0a7d6d9116d
SHA256:9e619a1f69bbc8f9ac93cba55444766e251248a6261d2392077182bfa82fde17
File Path: C:\Windows\System32\downlevel\API-MS-Win-Core-Kernel32-Private-L1-1-0.dll
MD5: 3d3c3dfeefd873917fb9103e43cc262f
SHA1: 7797d0a90a3fa10ac736c048fe96f7b2f8265765
SHA256:243d6b0e215740e93d540e0c88b0cd67b1e29c644478e550ab2e75e7dca2b950
File Path: C:\Windows\System32\downlevel\API-MS-Win-Core-Kernel32-Private-L1-1-1.dll
MD5: 2a19c70a86326977f51a2b3a50eec82b
SHA1: aea9bcf5f26749aafe134a6d5a5f643bcd4fe115
SHA256:b955f63f8b1e56d925d6a074b17cc6dfcdda8a49d6515390ad5ad80ae37fd9f2
File Path: C:\Windows\System32\downlevel\API-MS-Win-EventLog-Legacy-L1-1-0.dll
MD5: 8cb6780e6fc3cf4399c556c533226f43
SHA1: b97e59a1e1cf5af130de6508950ea7a7a46f1f18
SHA256:3ba608d6eac12f0ce5c90ef701ee50b6e758d3e17b4aa31eae4fb47942e7821f
File Path: C:\Windows\System32\downlevel\API-MS-Win-Eventing-ClassicProvider-L1-1-0.dll
MD5: 78347669c5ecafdd950b5feea248aa3f
SHA1: 8dc6eb02fe4381fd828aa1175bf05f482b50b456
SHA256:8bb7b7096a6acc7cea00062f5012f4785a0c3b9e840eb41ec1ff1b99bd119fd7
File Path: C:\Windows\System32\downlevel\API-MS-Win-Eventing-Controller-L1-1-0.dll
MD5: 9286601b48147afcf1b6bcbff23051f4
SHA1: 5bd8048882c27b83f7b924008adf0df1800185e8
SHA256:c1a0559fdaefdeacaf79a7be7f28d98b45bef719c8eac7d04dd79f069c35abf2
File Path: C:\Windows\System32\downlevel\API-MS-Win-Eventing-Legacy-L1-1-0.dll
MD5: 5151660c0c18244ea561e6281658872a
SHA1: 1dded30813f298854e120a0dd1d0ddac15fdc493
SHA256:c8fa5872b01cedf1f7c436c40693cebbd4499aace08458fa1d6793625df09c79
File Path: C:\Windows\System32\downlevel\API-MS-Win-Eventing-Provider-L1-1-0.dll
MD5: e1a6eb629d413ea5e833cdd52b90aa59
SHA1: 0bb81634b1cca270cb8d46dd55ad600ebd83c764
SHA256:f7ca160097b11482e586807b8932b0eeede8c1601acebc3938263e6687e42d48
File Path: C:\Windows\System32\downlevel\API-MS-Win-Security-Lsalookup-L2-1-0.dll
MD5: 2680b4c6e773bb2271ca362a790423df
SHA1: e975cdcfbafc4cbbe00f2e45499c1275bc728cf4
SHA256:cf181c9ae4d2b206efba806496e42eb182419737758416dfd884c828dc713883
File Path: C:\Windows\System32\downlevel\API-MS-Win-Security-Lsalookup-L2-1-1.dll
MD5: 2d974295b84f930cf86ae32389c3518b
SHA1: ebcebad5263cb8ccd7a009daa9987c3755008f02
SHA256:2292ac4851f70a5c5429e1363bba63e6b372aeec90421c7677a762e7589ec6ba
File Path: C:\Windows\System32\downlevel\API-MS-Win-core-file-l2-1-0.dll
MD5: 7bd70a0b41ff61d8a0fab8dfb0328d92
SHA1: 29b437879f6b30293cbb37d6539de81767c83798
SHA256:30399597b801d89cb7da031ee82bf06685f2865a2aee89356b71a387a484cba4
File Path: C:\Windows\System32\downlevel\API-MS-Win-core-file-l2-1-1.dll
MD5: 70e072f366c38539b0ae942b08132bc4
SHA1: 9fcf4317f154e88338ceadbff8e6553dd780a106
SHA256:1237ed1c36d092fc55e1991ebc8ba2cbe987e751b66f07d1c66726eba9dce507
File Path: C:\Windows\System32\downlevel\API-MS-Win-core-localization-obsolete-l1-2-0.dll
MD5: 650ee58049ebcbffb0edec2fe48842f6
SHA1: 9b1422ee44e223e9f9e2b6f347b9dc0a378fdf63
SHA256:b78322b9af844d9af7844bda23b5a5ef50c96a59b7d7ced794cd4ca8ce91d121
File Path: C:\Windows\System32\downlevel\API-MS-Win-core-string-l2-1-0.dll
MD5: 01796d7ed211ca10c09b658a95c6746e
SHA1: 471ca5aee1418dcea4f3893ed4d8c1ee59247101
SHA256:499e73694275c7ce50fe7b1ee21b4702e88c0be0bcdc045d21402e04f530f23c
File Path: C:\Windows\System32\downlevel\API-MS-Win-core-string-obsolete-l1-1-0.dll
MD5: d0d321a81993c6135db6f88cd79518ca
SHA1: 8b40d1e5d5d7221bfdfb2f557dd657257ca18638
SHA256:fe55db840cfc5fdf28d6a235ff6c8cf8a56a7647ec1f8732aadcbeb6e845ec65
File Path: C:\Windows\System32\downlevel\API-MS-Win-core-xstate-l2-1-0.dll
MD5: 268554f2d0b88943fb1040ce7d005f4b
SHA1: f1ecd2cf48ae8e7ae02bdfc22ea0011f59946932
SHA256:e1372583143bd271ccf1f435ee990ed19825b05f917dd723a37590e4948274f4
File Path: C:\Windows\System32\downlevel\API-MS-Win-devices-config-L1-1-0.dll
MD5: f28f2198f08eddb451c81923f367b4f4
SHA1: ec4439631a265c2b10607d76424ba57e572e06aa
SHA256:8aff1d47aa7c26ebaea9ad9df102c090fe99c9847a8c832ca95e05e5feb1793f
File Path: C:\Windows\System32\downlevel\API-MS-Win-devices-config-L1-1-1.dll
MD5: 24df58f071b1c2c47eb6b2258c28fc74
SHA1: 5e84e266692ff1b7f544598960ff376a3b2bf86b
SHA256:168eb4bced5ee47e1cbdaabab9e4af7e6a1e2e8aae5e6da9d30015350327d346
File Path: C:\Windows\System32\downlevel\API-MS-Win-security-lsapolicy-l1-1-0.dll
MD5: 09519536c526ac37cc4e403e78fc1689
SHA1: 70f4f92292c41605cb60461d6a0dc04d3ae7e10c
SHA256:9373ee7d86a2a970ef2ad4fb134362f30ffb9e059a04b29eb9965c70625e89e2
File Path: C:\Windows\System32\downlevel\API-MS-Win-security-provider-L1-1-0.dll
MD5: aea763a0dc0152317be353e175a06282
SHA1: d73bd7699f659474da4f1a4c2e1d7d1a61ec7ce2
SHA256:6e22552d89fe66d6612b06e2453efd8dd3bd645606945a3d5106799f63d6148c
File Path: C:\Windows\System32\APMon.dll
MD5: 0271490545ea8f63d535c33a690ed518
SHA1: 84ee2f064b12de106cdaad40f4f6fa26a133e861
SHA256:cf191a554b61d8e4ef11275754fd43149e8d0dc563cc3d36b1f83bb34134c9d6
File Path: C:\Windows\System32\migration\APMonPortMig.dll
MD5: e0280f5a010b06478b65cc95d9631bb0
SHA1: 30388c0be8f682d80dd302c835e32fa003cb2bfe
SHA256:e62cfef311887cf332ba60d219f2e091af187d20dea81ef99f59e7ef1434a257
File Path: C:\Windows\System32\APMonUI.dll
MD5: 9e4edbce51e26b0475c65a018587b023
SHA1: 297dda04662578f706218205185a5cf58d27d474
SHA256:2d18afe7d1f1a8fbfd2491901d45791d0853a5dc9ca38c1b8a195f982627f8a4
File Path: C:\Windows\System32\ARP.EXE
MD5: 2af1b2c042b83437a4be82b19749fa98
SHA1: 9bb265d4582de87eba4e34081bd122c3395a232e
SHA256:7b79171410482f410b7572c58edb7fd39326f7150c7c6882249b1cf9d7c970f0
File Path: C:\Windows\System32\AUDIOKSE.dll
MD5: 1f3e28f390d4c6e9599d56178e45c3fc
SHA1: 0fce59589390795ad4cc75658af3f62175335638
SHA256:cdbb779b0c158ace783c19722dbd8bcae7707d837eab4adc9a32ba6426b98c50
File Path: C:\Windows\System32\AarSvc.dll
MD5: f2408571860dd28231235981e6bc6365
SHA1: 12065fa70f125e0e96969ea0cc237ceaf33c2cf4
SHA256:824ecb28095bbaefc778a8436465720d3587aefaa624c0260ccb2ef1d1b19f9c
File Path: C:\Windows\System32\AboutSettingsHandlers.dll
MD5: 51f07625686a75ec3267cd3f3506fa9d
SHA1: cd53bde4f5c36c1293a703d5bf63df552dd5dfb8
SHA256:e215a72ae681762ac1ef82321bdf5e34ec5759aec5381907f6e07af1117715ca
File Path: C:\Windows\System32\AboveLockAppHost.dll
MD5: 8ee8c385b6528041ea1edaa3e11d29f6
SHA1: bbba794c138b66958737cb0a50d587134a47bdb9
SHA256:06ddbc9ea00dd0c3c4a69809fa62e9b5c59f69a2c3bf9f230fe6728c5e3c7f9a
File Path: C:\Windows\System32\AcGenral.dll
MD5: d996fa0351141ea908e2c0e52d6bfa34
SHA1: 12cc7bb0f7cb17a6d41aca45ecfbc7d73b42547b
SHA256:d0bde3efcc6299149dc67a6285c63a214f70be2abe2997e5011b7cec64255872
File Path: C:\Windows\System32\AcLayers.dll
MD5: 3a515be88a59d8e0abaa0c299a5019b1
SHA1: 0af8f3d0d3a34032b285433728ab4017e5c4a2c6
SHA256:5620f93cbde964ed16b7f3fadc74751e1867447a625da8593424ee3c2e0e7b8e
File Path: C:\Windows\System32\AcSpecfc.dll
MD5: d18a014d26a42c0ab931f05e3fe7dc3a
SHA1: d9d1cd3de6cf0808fdf0d1e3118c44ed41fa3d3f
SHA256:35baad73ba5d1fed20e9d9d8178e6fcb5c08e16007e454d2f1165d5513abb281
File Path: C:\Windows\System32\AcWinRT.dll
MD5: 4d9f84d705440f6def290766526adf7f
SHA1: dafd80077d6e91c1983a156e5ae717dc30b6566f
SHA256:dc56103a79f833c17252db87d7a8e38d862949ac4f5ee35ebc3258e99c4d7a8f
File Path: C:\Windows\System32\AcXtrnal.dll
MD5: fa190ec850d81084f1fb76b5401b1e76
SHA1: 51a6b08f67b266869989c95a7de782539421158c
SHA256:54c41ea35c14222270ce11c247de2b87931fa8ea3fb392f32ff686d949f50c09
File Path: C:\Windows\System32\AccountsRt.dll
MD5: 57aa92ab592710663b327848f7413c0d
SHA1: 0cfa5314cfdb52dbd36ef9158d49a818d80de870
SHA256:f0097e52b385de5938240935561033e5c11de1fffb733d2e9b4bd5d1d34a0c50
File Path: C:\Windows\System32\ActionCenter.dll
MD5: ab3c93390ebe531bff956a14120872c0
SHA1: 8db40c6a126ebb2023d902dc7cda56216bd1baef
SHA256:6a158bf2dd6baa53b1422aca5950dfe20a6cd1e0d0d3d6d454c8da9a9483a97f
File Path: C:\Windows\System32\ActionCenterCPL.dll
MD5: 985704f8369fd284923923eea2eb3d23
SHA1: d7354824ec2ac790e03110bb8faefaee81543181
SHA256:4b3760ad7128c1e24f4036deae7c6f79d16c2c46e7fe82e735d73eb61877f699
File Path: C:\Windows\System32\ActionQueue.dll
MD5: 077d9d55d2daee622bbbf57077a4a6fa
SHA1: d03ab167340a9bd6f16d78e588421569f8dbb653
SHA256:f7f95c36c3986fda91460cf51f2d33a738827d43faa418bdd108ccdafd8dd59f
File Path: C:\Windows\System32\ActivationClient.dll
MD5: 4c956c707fa2add7f2a989d66478eee4
SHA1: b6e39c85785e349aed87c344b9eb9f1bb456e003
SHA256:1ab8496c48dbbb50c4d3b26bc08f2503eaf548bbffdd028a9cf6dc0185e3e0a4
File Path: C:\Windows\System32\ActivationManager.dll
MD5: 790f13ed0e06d573c4c9cb5a426bdbec
SHA1: 5bad912629bf5a136e7b270b15953cf880aebbfd
SHA256:9c02a34067a83cb597d9d3d83442b6f4df4aafa0fc716b2542047069dd42a9c9
File Path: C:\Windows\System32\ActiveSyncCsp.dll
MD5: 19fc75affdf39c9bea705898042315e0
SHA1: 94716e597ef8fcbadcd47180835a81c9af1d63f8
SHA256:9e93027c467d479da118f5da269a003786386dcf8b4d0526f5d4b93f0ace1b9b
File Path: C:\Windows\System32\ActiveSyncProvider.dll
MD5: ae097d6faca854a02642f6fdbfd1d967
SHA1: cd9d4c40cd30219a4494f5497d999c2dec5b98c2
SHA256:4ef9b2e7a0bfe36aaf1d2205fa72e3c82a3a7d43a26018535887e4f9bf1d9e30
File Path: C:\Windows\System32\AdaptiveCards.dll
MD5: 9090a6886a502d49a02be81707b024d6
SHA1: 9266fc18d8d44c62e35cdb66f1c11e97e7e8a37b
SHA256:8d462c54c4f8c1e3318b1baec4aa516b18a2e62a8be456a7ec8d45a9cd898841
Description:
AddinDarkMode Lenovo Hotkeys
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\AddinDarkMode.dll
MD5: 54893d2a6a9e1215382bd18c27750f80
SHA1: 4131ae7180be3cc92d7bb206d5f2a25e6c78e414
SHA256:c64487afb6736615f79b92502be985b12d9056672e1be2393fa304c27942dee3
Description:
AddinDarkMode Lenovo Hotkeys
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_fdde6ecd49c3a98b\AddinDarkMode.dll
MD5: 38d307b8acfe3dbab53b81a9c3cd6a19
SHA1: c9c1153328febb9874cc50276dd90eaffbff373a
SHA256:5ca2253a415694ef7b84579ca74a3a028efc3e61515df593ef57438da6ce2d73
File Path: C:\Windows\System32\AddressParser.dll
MD5: e2887e970d3b90679712b93cada32183
SHA1: bd8ad815b3ece444441a48a93f098c5dda3fc9d3
SHA256:badcd79d596a18c6cd3367433ce242f3a7cc6e8bc705ff7c7e9610a3dac28830
File Path: C:\Windows\System32\AdmTmpl.dll
MD5: 605124862c36a3d7cca84b052fa6a510
SHA1: 8fceac45df15de65324ba3e725cb2bd2834e7caf
SHA256:180717635f6faf7e8676b6149f9fc6e81d2be236df2269abd152c067510d2cf0
File Path: C:\Windows\System32\AdvancedEmojiDS.dll
MD5: b4fe581196f7bb2f41bb06c1c2afbf42
SHA1: 4bce199a15e8c6994c14c530809a4fd2792d53c7
SHA256:a670ddaf3b1997004fde4150c8853e118e973160a07ea86e06fbf3bc268332c0
File Path: C:\Windows\System32\AgentService.exe
MD5: e65fcff8f7f23a2de6a9ae48024d7e0d
SHA1: 774dc784f7743e2d06c9d0d527a8464e42dff6ad
SHA256:f2c9ab18c36e7abd71d7849f07c00e9451149e1b73615470a18dce2e47b656a1
File Path: C:\Windows\System32\AggregatorHost.exe
MD5: e0a742f7c5fb4aef2320d014346e7dac
SHA1: 98a7d86131886fd2268d036130c053294847249b
SHA256:e0de0de9d8dd73bb81e9ac6f14eb97f77382e4147d0c96ef9775d97d7ebd8968
File Path: C:\Windows\System32\Analog.Shell.Broker.dll
MD5: 4592fe254454bba1b8e2ef93cfd50281
SHA1: 058b584e7d04996693b4ca6cf3c1337050329d93
SHA256:fc09183c9e5645f417dc0d01a8f31b3d880bf0beb511bc8eaea17c4bb4571d02
File Path: C:\Windows\System32\AnalogCommonProxyStub.dll
MD5: fdaae16cc86f9d21ba71a1bd7a80f8ba
SHA1: 3963fbf30f6b0b14764249e025902a020fc5549e
SHA256:3f5c498c4e9f1eb849e7446d1cef00ff57a61da553fc799d78184810c5d6dbf2
File Path: C:\Windows\System32\ApiSetHost.AppExecutionAlias.dll
MD5: 1d72764fa263f08cfad9e0cd1c46e297
SHA1: ad1ce021674c5eef3489fabddf9a06d89fe15515
SHA256:00a6e55ffcb17d880a23357c1c85c7bc45609b5aa32528737a95e871f153109f
File Path: C:\Windows\System32\AppContracts.dll
MD5: 31df5e4d73b416c19bcc87cc4162fb34
SHA1: 37138e35ae7489bc0e3a860031392cca4465cb1b
SHA256:a9eaf7c1511c834380db3dd7e8be750b967840030c832ecfae3de4afb1022035
File Path: C:\Windows\System32\AppExtension.dll
MD5: 6a184df29bd5a8d135cb41e16b111913
SHA1: 5b01f34c62cc8bac839aa713876f5ed55f446d9f
SHA256:f88ddc930497dd62219d064960ca177dd2692b66c64f8e2b8319b210b33835cb
File Path: C:\Windows\System32\AppHostRegistrationVerifier.exe
MD5: 825bbdbe835887ceda7936680b948903
SHA1: deb2ed9a3834ed30b801080fd0f3e90a5b686197
SHA256:b4a5acef4baaa25c730b2d8cf67879c2c229076036be637a003c9af4ac6dacef
File Path: C:\Windows\System32\AppIdPolicyEngineApi.dll
MD5: 7cb2896b592269383f469aacb8b47b3d
SHA1: 07aee2ef17398a389b1878c402219d9913026042
SHA256:b2a1dce5729cb711ef0d827babe973e3bc91f284096c29f98fb41a76db7a3251
File Path: C:\Windows\System32\AppInstallerPrompt.Desktop.dll
MD5: c798c30a6f3a0e2ec309213f3a78eae8
SHA1: b1dc3569c9f462b0c7aabc1abe2528343624630c
SHA256:79b17522e21f547ad20069abcc53242b4699059ee027772e85c585d870e8327e
File Path: C:\Windows\System32\AppListBackupLauncher.dll
MD5: b4ffd0cc98a51cfc15e1aad764f6796a
SHA1: 8a4c0e49d2364b4fa2f36b3dae57bedd3aafa4d6
SHA256:8c0bab25c50b40d20b42f57d79f5312fbd576be7ef17ab832701f0dd14fb54ca
File Path: C:\Windows\System32\AppLockerCSP.dll
MD5: 6b88e00b09bb6e59ea1b8d4ba27b5bb7
SHA1: f35954b772db2fd661661113de19a9e2b2d37225
SHA256:3c41a012dc445f9890c9aae172fde202a1ff65ba283dc2882fd5f3d28381641e
File Path: C:\Windows\System32\migration\AppManMigrationPlugin.dll
MD5: 1c122d34e6093f666b46e0e6216120c9
SHA1: d31fc9534788dcf60be828ba8e28811fd6e885b0
SHA256:db5381be70902d32f281fc265d950cdf7ff206f2a49a869d74b6e1605d96e3c0
File Path: C:\Windows\System32\AppManagementConfiguration.dll
MD5: 3dda056a185a3f6438b42a8d0534aae3
SHA1: 1dd079d30002f8ddf2c55915b8f13e9310b620e3
SHA256:01cd757b5380bfb898c1ac4dc714982e8e146c54a08917a1881fe6fe62551db9
File Path: C:\Windows\System32\AppMon.dll
MD5: 503c8b34d53698eeb28686fb1289a333
SHA1: 4e498c68a92fc193208e7921dee92ea498f0a5f3
SHA256:3253131a8b7c5e6189cc7ca5a0ba6f3ece644fa04971f7beaf777a23257650b5
File Path: C:\Windows\System32\AppReadiness.dll
MD5: 68375ddecc16ed75c23085fbfdb604b9
SHA1: 3f5eefbde1dc4eeeccd93c745c888782203df549
SHA256:1e0ed5eaf2dc89a3148e8d8e2676e8bf701146896127e559f6e9873e96d27345
File Path: C:\Windows\System32\AppResolver.dll
MD5: 7719c025463c5456778de304729d57f6
SHA1: c73f9c7f1c65507705dedd1badd03303b2e76521
SHA256:943cbeba550f6440bc0d3347cf4ef85ea675c886ad13e9621899380289a913bd
File Path: C:\Windows\System32\AppVCatalog.dll
MD5: f5dc5d7cbc9deb61a368637f43782ff2
SHA1: 225221679649c2805626b8dfd8536905e044df15
SHA256:06efe0b11ba62e95ccb3fdfeaa570159ef98d1b4319ad62c7285bbe19e708312
File Path: C:\Windows\System32\AppVClient.exe
MD5: 011ad237207508c6e8192c37f2739170
SHA1: d9755996b6846762cf973a8f59e36c18a465d36a
SHA256:7a746e8d04e52869d4c2c2e2a5c29660dda93314e2e5effdd478e0dc4bb51826
File Path: C:\Windows\System32\AppVClientPS.dll
MD5: e696a7c947bb1a0ad7cb64a78dd254be
SHA1: d56697ff7b0f8483d67dc63afa873810e7f5d35c
SHA256:156cdd41aa754b362381ab455fa4ad01a25874e3825a0f2b9b5fb47c52b5283d
File Path: C:\Windows\System32\AppVDllSurrogate.exe
MD5: 3c6fe68a25434edbaa71474530bc608f
SHA1: ac3b0dd2640df5dca47dea3fc21acc0ccc3ab1a2
SHA256:62fa02a4e3e2785fef492008cc0326f7fad193465d19ed70a00b73f8b883b310
File Path: C:\Windows\System32\AppVEntStreamingManager.dll
MD5: 1179724466672f0fe76492d01a66c79c
SHA1: 3d09e8149f3d558bac675f6220fc23ae8fc55715
SHA256:5acd5ea78c472e57bb073a49fb9e616a207c59ff5fe86e6b3c737b763bb0c060
File Path: C:\Windows\System32\AppVEntSubsystemController.dll
MD5: f285522dfbda5c5bfa19def016e88e6f
SHA1: 2ca32479afeef7f43466bdf2734752ceccfbfae4
SHA256:32f45750360c21424f2c8b68a1c2a8e5c1a56b3cfeb7e9e2dd02d7591a08fa04
File Path: C:\Windows\System32\AppVEntSubsystems64.dll
MD5: 67629eb8f3dbaf5db19570629e35eb75
SHA1: dca84148ba81140a297113b8554e8c38a6ddf7a7
SHA256:f074213bbc79e00413695a103d5a88e66b5e4ee37b5fdb1afdece868ba41bd3d
File Path: C:\Windows\System32\AppVEntVirtualization.dll
MD5: 184cafe5ef3ff906b32540c4976c168c
SHA1: 7fb1ec14ab59eafd5274f8572a79b1c034c3d036
SHA256:82ed89efa3d3a2f64f586426ef3a4216e532bdfdb895770c184ad42ef0c081b1
File Path: C:\Windows\System32\AppVFileSystemMetadata.dll
MD5: 9b8f09a7ddcab69a0acc03c345ff58c2
SHA1: 29c960c43a43b444366deb912868dc8cb3871ad8
SHA256:11a85b08df4ab76fced2cdae38dbfe8d3de4828ea7edd60ed917149162571af9
File Path: C:\Windows\System32\AppVIntegration.dll
MD5: c7d170298af39069bc465f06470f13da
SHA1: 55a29936104215255892a3d7e1686fd0616924f7
SHA256:6e2e7615ff43ebb0af9c398bd42fdbd1051a21573320ceb58730c0fc6ec71d7c
File Path: C:\Windows\System32\AppVManifest.dll
MD5: 5ac69e1949ad7d6981e8c810e5637a3f
SHA1: 223a8bb748ba37e8665f6d037af612a54835003d
SHA256:330d8de08a09c861a42fb309563c50a94af01f49d2ef9658bfb0f781b378b20d
File Path: C:\Windows\System32\AppVNice.exe
MD5: e624ba7124e9eaa448c60f6f30b97e0f
SHA1: 7797918884d54bc7a125fb907fb32535fe69a885
SHA256:f2f18fe0019929ff911ceaefb9193abe0545b74a72483e8826da504df1001585
File Path: C:\Windows\System32\AppVOrchestration.dll
MD5: e2683e73627954c40e4c415cd83d8346
SHA1: 169f31904a7f4e610fe8b26d2caa681ae5901480
SHA256:bea615a30f926dcfa3c8d6f767092fe5a597cc166ccc051f19b5b0a74cda5fa6
File Path: C:\Windows\System32\AppVPolicy.dll
MD5: d9c9078d47a3a78567759e26cd6f1394
SHA1: 8a55bbe874d1103a742d3d129cb42e953b842fa2
SHA256:881369c761c53094ddc4aafdedf2efb661ae559cbec647584b2cccafce1839e8
File Path: C:\Windows\System32\AppVPublishing.dll
MD5: fe0c81d852734c68de9925d13d5b0433
SHA1: e253c2aad141d1f12ce613278f4a13af7ae957c7
SHA256:6e31cd82ee306a4020d3a3acb1336a2915bde82282ab4f961e0b406d07463c46
File Path: C:\Windows\System32\AppVReporting.dll
MD5: 7059b9cae64d4fba91cfcc7a0126316b
SHA1: 073463c098b7e89c5e44994c8c6720b15b3951a5
SHA256:5ffd30a55b85e68341844d2beff33a9959a09adf47023ebec174e683183e75e0
File Path: C:\Windows\System32\AppVScripting.dll
MD5: 7c76c1e515d9e248194fe2f4cc89d89b
SHA1: b6264c112eb4b03f4d6954cb6179d45a42c49b1c
SHA256:7e0be2b931af6252998ce6ca9614bb3ec0518a21c46e6c08f2f390bcb877ff62
File Path: C:\Windows\System32\AppVSentinel.dll
MD5: fc0188566d7596e59d00738dd00fde80
SHA1: f7fe3a1b564fcb4fc54822836155497bdd81e1ea
SHA256:b68cc88667aeba5c271e94d3d958f225af4b67ed1dda13bb954145af871c8d51
File Path: C:\Windows\System32\AppVShNotify.exe
MD5: 9b9488260e71c91aa2bfce9468793a0e
SHA1: 38b6dde73e6b141b97129d1f8849948829be0e6a
SHA256:74af3030f14d8c5aa1608e6a7efa845818fab3c12068ab619f1a30f292cb9662
File Path: C:\Windows\System32\AppVStreamMap.dll
MD5: e98411127031b06e20f43031be3781fd
SHA1: ecd187b51ab0f7cd02a70d9d5e001b39ae1fb109
SHA256:78575fc8dc0a2d58f5c3d604b0baf31ff868ce6222aba047c266a99f4a62db9a
File Path: C:\Windows\System32\AppVStreamingUX.dll
MD5: dae418613be2e3e7c96be35dc954f6ed
SHA1: e32d5472fe282455f350e870968aff6848186b70
SHA256:077fb309a56fe98d74c32ca74ff71843b9ba8a986995cea4850ecd4ea51fdd9b
File Path: C:\Windows\System32\AppV\AppVStreamingUX.exe
MD5: 74ea368136fdbd43e5c04b0a7f5ee40c
SHA1: ad04ef635ab26e6bf6bdefe551b40bfed27918d2
SHA256:278221798d8eb271ae67c3edec1f146304ca9ccc94499f648292f0e5a08aee8a
File Path: C:\Windows\System32\en\AppVStreamingUX.resources.dll
MD5: 0a83e6ba33ab4e47b9c2d7278b572671
SHA1: 35e07d1a13dfe492689918efe2627649a7cb1e4d
SHA256:af7a26bc8550ff738ae38d28a1e1b494c6bae4af5646db44284a38a0803146f8
File Path: C:\Windows\System32\AppVTerminator.dll
MD5: 19cccb59d6703cd7b2d66c2223d6d945
SHA1: 0e18626cb1d33b2b781fc63e51bb76b2674d8027
SHA256:c98d1e9d0fa487030016fc9ab57b6f35bc2a321933c28536d28124530c0688ce
File Path: C:\Windows\System32\AppXApplicabilityBlob.dll
MD5: a4ed00ed994ec6c7a45b30e012fd1df2
SHA1: c19116aabe2dd2bb1cf72778ca6d5d7503fb59b3
SHA256:4b9f8cb53ded75fd3c0721aae6757718cf1c475207fea3eca9ecb6c59ef00f08
File Path: C:\Windows\System32\AppXDeploymentClient.dll
MD5: a13d84c19cd53fe248e3834f3a7c17ce
SHA1: 262e44d7571be2a6d3679851b2e6e083dd23347e
SHA256:4591d1cbe3f74fb99fafaafdf44915236860c2d60d8c2fb0feebe9d1e55dfa68
File Path: C:\Windows\System32\AppXDeploymentExtensions.desktop.dll
MD5: 6e5059b9db9cfae2a9c9d716125ec273
SHA1: 91366c4c131f635b96759b2607c7c982c09a7efb
SHA256:b09be4d9f4f55eaa1e2687c59c7c8024f5787c8e5ca5941acb03fff28b9715b4
File Path: C:\Windows\System32\AppXDeploymentExtensions.onecore.dll
MD5: 6b8dc97e596d4446e5b18ef1eceb8673
SHA1: a2608ea5f4d840ebcf9f1e89778b640e72ac4aa1
SHA256:039ffbbc6a7a4e8c04994db7a2edd412061e4e83398c590e772e537b2460f422
File Path: C:\Windows\System32\AppXDeploymentServer.dll
MD5: ebb0ef2370dc695b2df917d229cafad7
SHA1: 395b698b3c4a3967e4abb22e6fed8584452ff8f5
SHA256:6227e0375733f22cdeabddba0afeb20cb108861bed522dcef56c7c073c47bea3
File Path: C:\Windows\System32\Apphlpdm.dll
MD5: 6a87e896315182f9c7acf52141318361
SHA1: 223ea644d5ecccfafd805263e45062bab8fa0cc0
SHA256:52a99f5c7b4cecf5c8d529f4ffcf2743fd1a7a6773ffbe4c571eaad8e2394328
File Path: C:\Windows\System32\ApplicationControlCSP.dll
MD5: e38efd869196cf51d0666deabfb4eaf4
SHA1: 84fb6d97e510a8a2b1b61dd99a7f9346c7337d3e
SHA256:3a812ebf2761de0d9e1e69e09cb0b3e324fa9c749f7cb74794c485ae51e96df2
File Path: C:\Windows\System32\ApplicationFrame.dll
MD5: 10d3c95be45ecf382b12189afe97437b
SHA1: ecece08bcf0d6bac256e14e264929b60882d0838
SHA256:7e010f14cb9031bab4b4b39eca8e6531042e7ab6030b428f9e80d37688b46144
File Path: C:\Windows\System32\ApplicationFrameHost.exe
MD5: db2fefe19f85e618f62686cf453df33c
SHA1: 9a37897fb3e75074d451c87e5b3dd602545648a6
SHA256:67077124e4a881dba9e4c6e65c8bb45d5ab14a429959f935f933f5824596e463
File Path: C:\Windows\System32\ApplySettingsTemplateCatalog.exe
MD5: 70ec1d868c82b70f7e5eb6dcf178a9ba
SHA1: dcd704ec562a0a6d25c6276bf422c70e41e43ca3
SHA256:e3267d44474b034aeb189ef24d62e5f1c23ff78f301b8d40992f386b07f9acd7
File Path: C:\Windows\System32\ApplyTrustOffline.exe
MD5: 9950ee022a6c4ea4d30305e6ba7888dc
SHA1: 79fd17ede2d6a069afe25720ea7a267834d0c882
SHA256:df77d24b80683e81fc76094cd041171ebf97fff400781362db36d4b6a399a0b1
File Path: C:\Windows\System32\AppointmentActivation.dll
MD5: 32006eb82f4019087205fbde8133002d
SHA1: bb9011b1f139ee78c16743d3f8158054b6c99c7d
SHA256:3e76c1c7475326ee92492fe389b6ccf5ab88566473b04aec89fa0dc835313756
File Path: C:\Windows\System32\AppointmentApis.dll
MD5: 1fb5bafb96818d957ec0c2efccb3dbdc
SHA1: 9c118d64dc640cf16083067c45382c52b41f07e8
SHA256:5f986acbc87b9cb914d0572e1cec17fc812413f546edd70c80eea42388a62fe8
File Path: C:\Windows\System32\ApproveChildRequest.exe
MD5: 1d45358b6494f6c21c8fc82a0911abb4
SHA1: a8f3e4c6c1ecc451ee224629b157725c78107d72
SHA256:e04456289736614ec99f8977284bd5bdc256f04435cd807207d2b4238ba31790
File Path: C:\Windows\System32\AppvClientEventLog.dll
MD5: 6151290bd5e013d4119fc41ebb593f0b
SHA1: 7148e3476d7cca97a3bf603ddaea2a984afa2109
SHA256:fdc37b4f705d6c0c7252cfc8207d52d4f5a55546d45251b4065d6c9a6c018863
File Path: C:\Windows\System32\AppxAllUserStore.dll
MD5: aa4fa3f6889feb09b7f481b3a7a1202b
SHA1: 418ef37bc1d679913b4fc9cf064ce158f622cb66
SHA256:23ba3c6d6a4d660d53833ad35e4dc0be1ac1e53ab27fc8ccd51b68daa6f84f52
File Path: C:\Windows\System32\AppxApplicabilityEngine.dll
MD5: a0ccfac88272f2e7e1eb1a00771fd267
SHA1: 87eda2f4077e317151e31eed08c985a555e324ad
SHA256:39c86c7fc19789e830715395bb6f33066fa6b8c8a8fd4dc07b38572a9b20a3e2
File Path: C:\Windows\System32\AppxPackaging.dll
MD5: 5d8a897ecad9e58e98975a6c32efee30
SHA1: 6ccc399d793c77bea8f25c96a4425716ec10cf00
SHA256:5c5f7149b53cb3a77e769189ab8599101c6e812f5e1a616c957db2b5be6bddb1
File Path: C:\Windows\System32\Dism\AppxProvider.dll
MD5: eb9cbac1aa278b6a8afdb95a9feb4dcc
SHA1: 9f12442d4cab56ab451d3954783632f77be7f8e4
SHA256:1bf704107250f4c08fdf2c450d4ab402ba5317a8c026cddf98c0ce225f487d4c
File Path: C:\Windows\System32\AppxSip.dll
MD5: cc91f7dba86de549fbc9b3ef732feec9
SHA1: 09f9475e19d927f855711cf13a3f060dda4b63a3
SHA256:a56ca832d6eb0d43b330dc4234997f011f5b532f0f19cb4766c583081ad701b1
File Path: C:\Windows\System32\AppxStreamingDataSourcePS.dll
MD5: 280f40d38d95c5397fe612c561044ca3
SHA1: df055204a9c7de0c80e9f82e191c4379c38c2404
SHA256:73cb4cad4600ba5ec4fa70316a5727b413e76bd6bb15ac8ed31d4a03a5def5e7
File Path: C:\Windows\System32\AppxSysprep.dll
MD5: baa2f43603f6ecbee3725ad55a1d3cad
SHA1: cf50510fb6e234d567df3e4f7ebd03ebd8c5d56a
SHA256:ad886b5e942f0820df7f466cf3506d43c7bb41e4a6d21910058e0c16e232330b
File Path: C:\Windows\System32\migration\AppxUpgradeMigrationPlugin.dll
MD5: 1dc23322a38f8180e1cc5414f56c775d
SHA1: bd0af4c91985d889ae94e826e79c54e84f3b5912
SHA256:576c83da42bec2287c8ebde8a2ead4f3383cfeb807b0edb5f7f53b503ceb96a9
File Path: C:\Windows\System32\AssignedAccessCsp.dll
MD5: 1127f7e1ed8cb63e5f3f012e5f26fae0
SHA1: 726766c9f98e152fc12178e95509bf95c8bacc5d
SHA256:d871f3fb8d9e21db7a0530ca0a3dc2934446469ef7416ff5e9accb228a51394d
File Path: C:\Windows\System32\AssignedAccessGuard.exe
MD5: 5a24030a3eaf02f8f606a44c5be584ec
SHA1: 19b586a09025fc53259359ebecc5cee9af4eba33
SHA256:d45bf1b8de52fa10731878acf01cfd022a44d30e7c9115016b0009b656859263
File Path: C:\Windows\System32\AssignedAccessManager.dll
MD5: e8a492b5a930024ba390623bd5e18b4a
SHA1: d503ed4652b13f6ea16d7568c990191df5b78f23
SHA256:88ae0510a33e0553681f2313fdf50db9e8f60f8070e7a71c1bd7c0282f9ce23b
File Path: C:\Windows\System32\AssignedAccessRuntime.dll
MD5: 37ee2496ed9c8e094f89741b570b452e
SHA1: e1212887f9e521a4529efe558e20b4d31a860daf
SHA256:61fa8fb64cc835ac674599bca5b949f423c3c5f788ab3c2fbcc0e45eeba45818
File Path: C:\Windows\System32\AssignedAccessShellProxy.dll
MD5: a0eb33d9c565989549040f3a106fc2a9
SHA1: d36c0208090bda268c1fae9fbec27b81edbf4ea8
SHA256:34d338fd6be6692aa8cd5b325ad0a26c1630fca9f19633e7d7f97d764808dedc
File Path: C:\Windows\System32\Dism\AssocProvider.dll
MD5: b7db592706d3eefbcf0d5a166d462e56
SHA1: 935123fda68594f0c52a765c4bbf468e4458189f
SHA256:de21321272862e7c332e1724dc315f06f3abe7a0340e61d351cab208d6bbf059
File Path: C:\Windows\System32\AtBroker.exe
MD5: d0671a805a2e76925de3154741289b08
SHA1: 2c5fda09c7e89d88cecf9dfd35ab79fa5b324806
SHA256:d3eb72a2e4bc302d15d1b6dca9b4e0efe550d40351d5c90700d8b3d7314c2830
File Path: C:\Windows\System32\AudioEndpointBuilder.dll
MD5: 310028935f79bb5d8553ba21200429f3
SHA1: a2674192205001ce2578259ed9c2f85e9c88040d
SHA256:74c10281e3828e90be26c3bcb19ad16ef812889ce79756f40cbbd15d58c84daf
File Path: C:\Windows\System32\AudioEng.dll
MD5: 7596213157a565710a2ee1373efe0f56
SHA1: 8b9cfc972807c076b16f7a19834f844a813333b4
SHA256:0b941a9b9eb99cfa6daa770c9e696a1168af830ac8c96c2b9282492878f60c17
File Path: C:\Windows\System32\AudioHandlers.dll
MD5: 13ae34ca751bc5037f49e8165ed336d6
SHA1: 212635790951fb4740417e37f0ecc35754deb839
SHA256:6256531507868f890317a3be73aff3a03ab9bf2300dbbd0ef559e88e1a8475a1
File Path: C:\Windows\System32\AudioSes.dll
MD5: 4f97bce37e23ebca5c48f31cbbe0dc6e
SHA1: 7ac6337a434a1fbb32c5ebafcab089646f162dca
SHA256:25c5b25ce7f0e3fafc53224c6d4b2897befc8bfceb65a5aa1ae79b0a34378e62
File Path: C:\Windows\System32\AudioSrvPolicyManager.dll
MD5: ca999864d84b4633960b475206f1b765
SHA1: 36cbae6fb3539c19bc47d8ee8c3f8085da1ba459
SHA256:2b5a9890a8c8207c42b0418fc369ac4eb55ebeb8f44e3dccb90538c913e7baaa
File Path: C:\Windows\System32\AuditNativeSnapIn.dll
MD5: 18f5caae7cefd006f9f35276ecee4959
SHA1: 66823a60770dd7fb37bb88343c1653717d6fe661
SHA256:aa41d177704d55fd22d1745809f75dfa598e60644d7bea282ecfadfd0e97b654
File Path: C:\Windows\System32\AuditPolicyGPInterop.dll
MD5: 7d69dcddbc30e970fbfe8c8ddd79c1d8
SHA1: 04c595cf7afe098707235228eb832a7454be6256
SHA256:c54cac79c4168f588cbcd139f7e9f1a8058e0ceba2f49df670577cc8f6694c34
File Path: C:\Windows\System32\oobe\AuditShD.exe
MD5: 3a1c0003c06112db9a02057247fafdd4
SHA1: c90f775f71b51485c50d24da986372d6b9101a5d
SHA256:3add975195e26364c5c428873c53d7e79b4761c6730fb01ae7d4a96a42529200
File Path: C:\Windows\System32\AuthBroker.dll
MD5: 2080873c442d476d24936aba950e1eed
SHA1: 08dbabbd5866797c83da8b5446b03a49f6269fed
SHA256:bf670d4ce4542601734b99946bb9daa994b1b3774a3374709a52637e5df97c21
File Path: C:\Windows\System32\AuthBrokerUI.dll
MD5: 668d387eecc4b0e79ed4182b576068e3
SHA1: 05376115bfd64dec202719b237441edb8ce99d78
SHA256:c822a9ab7cc637f2d5e738dfb7ba51c90d870d541461f8a8879b50202e723374
File Path: C:\Windows\System32\AuthExt.dll
MD5: 07a65337c30f7f7e6b763fa7357ebfcc
SHA1: d97b94fbf265d5b0b218b911ac36f60bcf8f5462
SHA256:a684dd26ede18efb85c417a3a67b22d09d5d740a20fa80e7e453aae8fbb954e1
File Path: C:\Windows\System32\AuthFWGP.dll
MD5: c15902a68b6f5b5495e1f096cb1ef219
SHA1: f4e7f88c3fecbcac7b7ef239629392def2792f78
SHA256:934fff9b9e5f7c1b4e2fe5fd5bce50e79ba97a2ea702d1c9d598c1cb196c0e29
File Path: C:\Windows\System32\en\AuthFWSnapIn.Resources.dll
MD5: 6cfbf9dafdc4a1fd411ab1f814c6b89a
SHA1: 164e2ec771a6af7d495a99e232010d39e20d7559
SHA256:8e40274b255c5558a59a7bce9d0bb082b64e7536f45a48fc576850c2ab3991fd
Description:
Microsoft.WindowsFirewall.SnapIn Windows Defender Firewall with Advanced Security Snap-in
File Path: C:\Windows\System32\AuthFWSnapin.dll
MD5: 54da2e8e0179bf4308ba61fcaf012f6c
SHA1: e5a335501dcdd7fe9c4921588bbcbd1e1f5d7930
SHA256:5d90dab38b70f7aad01935597856f8105d44239f83e2f53c613c70316e2abf6e
File Path: C:\Windows\System32\en\AuthFWWizFwk.Resources.dll
MD5: a5877e6b75c584378646d22f2ca10b5d
SHA1: 49a3a05865676fef75f60c006de1af9d47d2292a
SHA256:76c2c73bb2ee095f39c8946b030288db6ff20725049776d1d7206d9ab1e5badb
Description:
Wizard Framework
File Path: C:\Windows\System32\AuthFWWizFwk.dll
MD5: c503834fe932e54cd4be65fc3801311f
SHA1: 048915f090e6d0a47b466ccd99025435abeab6d2
SHA256:693cecdbf650daec9c1e4c712c6134e9c857deb10dbd626fa9fe4aca41a50a71
File Path: C:\Windows\System32\AuthHost.exe
MD5: 7da1d6a5452178fbe8122a12d0d9f0ac
SHA1: 85c9cd309649c5cdec3694f2d57fe28a81315f09
SHA256:3663ed060511967946605e43f901c5d6f86222ef1015ec61660e63c6f4d1b229
File Path: C:\Windows\System32\AuthHostProxy.dll
MD5: 85e2904ba746dbf979b09cc613b25023
SHA1: 00bdbfa9177743d779e81bcbf3706e0a9c1fd141
SHA256:8a9b6f05a598a6ef783f9863b2f604d73b766e71c550fc0e79051393a35606b0
File Path: C:\Windows\System32\AutomaticAppSignInPolicy.dll
MD5: 828c66db8001973bdc8bd812981125f7
SHA1: ffef586730c3e845dcedd56212f2bcb374c3473f
SHA256:d4709e83c2ad6fa2882fd8c19d3e12d5750c6198ce7a00edcbcacb4441f2050d
File Path: C:\Windows\System32\AxInstSv.dll
MD5: 7047b6be96d77873c9a9528a39079763
SHA1: 8000b2a406a6e2d3749db7cb563ba5601515ba5c
SHA256:4b52918a77dcfb714ad46cfbed1b9deb76551b5f18b251c4f33364d060dff7cc
File Path: C:\Windows\System32\AxInstUI.exe
MD5: d312f113ab5e29f5b63a6c48d28d3ee5
SHA1: 99c5ee4dd431bf2fd6dc884e9a2f6f222d9a2c74
SHA256:ee8103b16afbb483319161bc713d12c46debe35c9e39e598ac8368d9b23b03e6
File Path: C:\Windows\System32\AzSqlExt.dll
MD5: 2924b168076b0879296493bac9e6a51b
SHA1: 92b9e20b0dd8ce530d9e5e9cd278379b4a425bc6
SHA256:c53f83a7c7df88f52eabf4e98fdbe6e4187f533d13456c95b4290681e710a041
File Path: C:\Windows\System32\AzureSettingSyncProvider.dll
MD5: 99ce55bfad9828197e5a9df13cee56f0
SHA1: a2a8f0f89cbc760e54d6283f5ac4aec4f871bad0
SHA256:9104a28b61548bcd5df2d7296e31de21b51cd2897b404ec6709b9a4aedfa390e
File Path: C:\Windows\System32\BCP47Langs.dll
MD5: 47e1764b3040c8acd68e477402c15ef8
SHA1: 47b3c4151b9688f2aaaa308f61871d73375c34f8
SHA256:8464626a81ae33f5a517fc4e6ca02357310dea7f8b9995ee20bd0f7c8193ecbf
File Path: C:\Windows\System32\BCP47mrm.dll
MD5: 3a7a4e989103db74b9732ce4d2f2ae54
SHA1: 661c5f3f279d18d4dc608c1ea6c100a18dd53d64
SHA256:ad49ca6522353da54ca117aedb839621233f1ce97dec3e3ec7739b06e29bc5ea
File Path: C:\Windows\System32\BFE.DLL
MD5: 680a8275714692b31dd194528da033f6
SHA1: e903fede0ab87313ece870551407544b489ec197
SHA256:2ca5b14bdb68fbd954a5e4746998cef7f95160cf5a909bfa3714ba67624f2dc9
File Path: C:\Windows\System32\BOOTVID.DLL
MD5: 3c595a15f4d7679d6c4b5fb0c4ce5885
SHA1: ee0ecaedf725849dac93d4f32a4fd7ee3a448c3c
SHA256:de2f4364da996c125b7b4ff6ad5e14a94f38620d9b61459a65797b8cd537b957
File Path: C:\Windows\System32\BTAGService.dll
MD5: 60f2bc046f5384a7a0e106fac72b4bd5
SHA1: 7685b312f74eb4fc6370f687101f8c3bd70d4a01
SHA256:a3c5b2e7e4ea07a3577b40045d7060d0b37d16725f4a9df86e71ee5ab3a562b9
File Path: C:\Windows\System32\BWContextHandler.dll
MD5: fd13e8bd571751a1e80251aa972021a2
SHA1: cd26cbbd564b235ef30f267cca752079585b274a
SHA256:8cb1ac132a3c1f5ccb96ab0662a5b03209f8933ee2a10d0b6f1277e1e3762226
File Path: C:\Windows\System32\BackgroundMediaPolicy.dll
MD5: ab453c5ec0d47cefdd034eceea7c2ac7
SHA1: 553bdf77a2f32c71d9edc3938cfcdc3ddb002008
SHA256:10142e18599b0b6576df06c35bb1b6e3f980323da2a2297955819673afa7f699
File Path: C:\Windows\System32\BackgroundTransferHost.exe
MD5: 2bc28cd460f17ce090963a834b9c297b
SHA1: 15e3aa68f362cb6d403c6b2175102de4b9f38829
SHA256:397e4a972d6665dc9c96df4161c2a3e268f78590fb09048b0c19f3b5d3dd9a8a
File Path: C:\Windows\System32\BamSettingsClient.dll
MD5: e84c848c01d7ac0d835519c05775ba2e
SHA1: e0a1ca48ffe1fb0c6fa612c53369fd97b5b0f233
SHA256:6c493380fa6e86b10c3bbb0238520cb411ecac5b5ee45ee0c8ddecf7f8a2e13d
File Path: C:\Windows\System32\BarcodeProvisioningPlugin.dll
MD5: 2aaf9a577c2620b403d74368ac7707de
SHA1: ea24b1913a865e36eb0d584dcccd087775f06af8
SHA256:dc83b51a2f745260cad367764a890b5fd4d4c58b948288799095fcff8bc69a5b
File Path: C:\Windows\System32\PointOfService\ProtocolProviders\BarcodeScannerProtocolProvider.dll
MD5: c1bbd8384ebc74f91574247f92f985df
SHA1: 6ebb42efbe449ceb633a27789589074633934e90
SHA256:68676002239d2b5f75097c9b063bd227098fa56ad012f05a3e5141edbaf547cb
File Path: C:\Windows\System32\BcastDVRBroker.dll
MD5: 2ec1c2e5193970c1303e63e6182c8adc
SHA1: e3f03bef718def7f40fa8faf7eb1bcac4fcc40bd
SHA256:4ddf1a4c6a9c4e7f7039584c14ea0e7f2d91aec2476a3a9c8a040063adae3930
File Path: C:\Windows\System32\BcastDVRClient.dll
MD5: 0f20b9f6d5189cd9acd4715d6aa135ed
SHA1: 77d0217ef337d57634b4bf0c0e75105e01a98de5
SHA256:7db701a7ae7bd97ec2748a24be0e8bea8fcbc4eeac2b539147109182e264ebed
File Path: C:\Windows\System32\BcastDVRCommon.dll
MD5: e8ab546c22171b0aa355040a92dc7f1c
SHA1: 2f924048036fea6f7dc04ead2ad9d4e455302ad3
SHA256:c0596e1dd2c61322436a1fd45f412d42d0febd1e41241b3ec836ff5217be38ad
File Path: C:\Windows\System32\BdeHdCfg.exe
MD5: a3a018fdcc0caf7dc607ddccc430228f
SHA1: e43689fee71e5ef8a1b736a7bf2c5b6aa33eed7c
SHA256:a87454e4a7277a55ae0769f9bea07c15cc2381d50fe08a775d40ccac6792de13
File Path: C:\Windows\System32\BdeHdCfgLib.dll
MD5: e5127ca3cd8fbc63cb5ab50f88e26c21
SHA1: 1d38920b471aeb0eaf0c770cdc2de71ba2115d58
SHA256:e515fb9b1b286d409ac39da73ca7d4ddcef2ed86358539f2cb2fdbfa64e7d99d
File Path: C:\Windows\System32\BdeSysprep.dll
MD5: 6c09e0783b276c7ff7123acba5dfd96b
SHA1: e3ce2faae4c7e58525e05a0bb7359ebcbf76b7a4
SHA256:a1f1acf79abace51d220d6a7f6576daac921ff4b908e256a9982b1f1e3e506dc
File Path: C:\Windows\System32\BdeUISrv.exe
MD5: 268ea955ebe129b460771b33a91d70c2
SHA1: 05198f7330dbd51edb1a59c332a37468a89c8a6f
SHA256:e26ccd07528c55b1f8353dd22daed874a9359bd62fc15f8016741ac0a9f944a3
File Path: C:\Windows\System32\BingASDS.dll
MD5: 776971049eb1bdc75472ee620ffefd9d
SHA1: 0baefa0fc1213d0a89a7ac453b14ecc2d3024f58
SHA256:f6e611d80376469a7d7a4c914c6cce4e587f820ce922d461eba39a80004539d1
File Path: C:\Windows\System32\BingFilterDS.dll
MD5: e9625ac8b75b7c26f22f67740a2b07ab
SHA1: f50bc4535e384f75610990708fba2eaf92693bf2
SHA256:b39dbf44feca296eff88281c9ec007f4d539aeba988be1631afbd261edfb6bec
File Path: C:\Windows\System32\BingMaps.dll
MD5: 5b6513ff6c0a921c6c41b01cf79a63e8
SHA1: 165b072b9dafaede7924a5ffe32fffff48a4b0f8
SHA256:5b5350e578cbd0a8c56119684b7c1c99c212679b3d0c4ecd6ccee88c8ebce420
File Path: C:\Windows\System32\BingOnlineServices.dll
MD5: 0e44ad73b1cdf3174500aa0ebbb06d2d
SHA1: d8256a829e530b6cc98e804817ae8d4c6e17d63a
SHA256:e1b5ec10042fc99abb26beab9f1eaa8630609abf0a408c20d3af6ab28a4c60ef
File Path: C:\Windows\System32\BioCredProv.dll
MD5: 4ebaa4b5f91b2cad89b105ae7e7fb6bc
SHA1: bb148b3cc6c898fca7cc17e509fdb4ae2cc79cf2
SHA256:823c96a1815fbe309022ea1331fda06a0f3a4bda2b84e7fac8b3f05fae26b512
File Path: C:\Windows\System32\BioIso.exe
MD5: 2e04a705178162ee145669bfa594b93b
SHA1: 2360de54081f6f22469e915e00740a84b60bc93c
SHA256:4c51b6c84e3bd79084b6038389471fbf9cd9dbf724a80547b7bcc9d4c05286af
File Path: C:\Windows\System32\BitLockerCsp.dll
MD5: 3aa19a4ce2491017578a75f7321484be
SHA1: e11acbd0361133cda53cf9965c6a68b5a3782be7
SHA256:5b2353eacb1d4826382e2c028e1edc1921184f4d8c80152509aae55e6c372a10
File Path: C:\Windows\System32\BitLockerDeviceEncryption.exe
MD5: a82ca1393ab8e49439059de1159ddc6d
SHA1: 80b5a05f5e8a634497622daee1fd2e276c869348
SHA256:197d19774ad078073c13eb35a65f1cfd316dc7781115d41d86f086c13dabf218
File Path: C:\Windows\System32\BitLockerWizard.exe
MD5: 95b1f24f2477fc5fc25127cef66f1be6
SHA1: 1531e580f0fdec75b0c0c173e4d8ac63f7f468ca
SHA256:abf63b6c49320f32d7177af6f49b109cb178c2074a9f38516ba9f843f94e1c81
File Path: C:\Windows\System32\BitLockerWizardElev.exe
MD5: 0a0f555672036b5613029685622e9efb
SHA1: 6f6075cb6175c787ad1aa2418740d1d8ca8f43bc
SHA256:3657bb996e7aa0c1232f9d71f107c763e216def02de337cd19b35c58fa8bc22e
File Path: C:\Windows\System32\BitsProxy.dll
MD5: b3e2baead079c29bc16caa7830a17fa6
SHA1: f76ceb9da1bd2f4e9c02e49758c654630518a066
SHA256:e72bf2adce95f764bd880a458b04ba0bebb0eba7eb3473a29fdbe3a98f1a86d5
File Path: C:\Windows\System32\BlbEvents.dll
MD5: 31b5040254e636587c7c9b20b702752f
SHA1: 45eedb01e3adb4c14634c750fbda83482882acba
SHA256:017fb0d2f56aaea5c76cce05fd601eb94a48056e1a3285be1aecefbe42e1d98b
File Path: C:\Windows\System32\BluetoothApis.dll
MD5: c9865f107f232748a1c30b4da4000f4e
SHA1: b2ba2a44745ded57cb33639821e59192a2ea186d
SHA256:4a7a1f7d02e159ec4acf683cc58cea6c53fdf6dccaf01ec8a6387a8f67ddd4e6
File Path: C:\Windows\System32\BluetoothDesktopHandlers.dll
MD5: 8e7d0a7b25d62255d226ba2dae754c3f
SHA1: 812fcc24c9d5be2593eeeaca3dc2b317ec895383
SHA256:b12987d870712a65c6e49bcd6614ae9fc37914e33858f8cf50e8839db2083e40
Description:
BlurSwitchCS
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_01d078da8c0f4900\BlurSwitchCS.dll
MD5: 9ba424f62790ed4ea4d7be706c08cd9c
SHA1: 208cbbf55dfbfd330c8438e2f41a5405d714f444
SHA256:17d8dec427aeaaad754954d4380b29e57699edf32e7ca6d86eb765d30ca13feb
Description:
Lenovo Hotkeys Lenovo Hotkeys
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\BlurSwitchCS.dll
MD5: 74ea10739b082d488f54771c73d31f56
SHA1: daed2232ac50b1d2f19f30d376c543e361533bf4
SHA256:c5e672ca38fd130d153b7ff92d1f756263072723f896d79f15c4e9d72f1a5a53
Description:
Lenovo Hotkeys Lenovo Hotkeys
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_fdde6ecd49c3a98b\BlurSwitchCS.dll
MD5: 8ee059a680efcea4e886bf12441b9f7e
SHA1: e89b36864d1b0818377a0fdcd2d319b1fc08886e
SHA256:52a3255280eb0ce72fabab828d2662ff83b6318052980229a3611007e7f98639
File Path: C:\Windows\System32\BootMenuUX.dll
MD5: 1ab16747800dbf2ae4bf65e5ebda7c28
SHA1: b24709f30ac0e4b7f4959ad19512eaa405189ad4
SHA256:df47441d12aeeef2b127ef61c83adcc8713ef9c8f40cfc7110520b78e181ac08
File Path: C:\Windows\System32\BrokerLib.dll
MD5: 99e1de00c0970e9fdd52c8cd905675e1
SHA1: f30407ec1c8dcd4778060cc3aa1c29c450864b2c
SHA256:1f9ba62672fb8aea7fb305150db89caf74233dae656d8d8e303f6ed6bf1e3e4b
File Path: C:\Windows\System32\BrowserSettingSync.dll
MD5: 526966a110705e4237df4289ea939424
SHA1: 80292e4b312e41a79124e7754a14db0f3f41db22
SHA256:38f74ba9dd8f99e25ce51ffa90208d49f35cb43c309fb7b0bdd2d22edf3a4a46
File Path: C:\Windows\System32\BthAvctpSvc.dll
MD5: d629973cddb8609b07483a9e5953fce9
SHA1: ad84e653a50a1f94406113207c3d1d686b4f0799
SHA256:3f122dc07e0495d840005d7910a90bfe241f37fce38cb926fbfb46699c0b93b4
File Path: C:\Windows\System32\BthAvrcp.dll
MD5: 041ae140cc54f9d429de27620407205b
SHA1: 7da4d069fa571f4627fe8f449823f4a114586c91
SHA256:20d486c3ed56e9dde582c8862fa71f4ee4d69b6ea7a07ad14a4b71a120f7da58
File Path: C:\Windows\System32\BthAvrcpAppSvc.dll
MD5: e82c7a739a6f2964cd87ff901e1faa87
SHA1: 420f616c8c3972b91272c2bf28292a2408c68b72
SHA256:180281ed293120848e07e1312e368d8ef86b44bed332656acb9d1e67d442bf89
File Path: C:\Windows\System32\migwiz\dlmanifests\Microsoft-Windows-Bluetooth-Config\BthMigPlugin.dll
MD5: ed7bef7903e66a9751e09215632d5f86
SHA1: caafe4ebea7e50dd030bc1f94fde53b94215d9d6
SHA256:39d2e4ac4ee80015a98fbec0b6914fa5fe3599456692c40fdbcb48eeca0b417f
File Path: C:\Windows\System32\BthMtpContextHandler.dll
MD5: 94371c6b255c5073bf6962970ad29391
SHA1: d915e167c35df34f7fd0fa1cf86b6a5ba166b866
SHA256:6f5b35d8734b5cd24f05134d88b2c6d56ef63e0a782b80ca9b17618b7b1096d7
File Path: C:\Windows\System32\BthRadioMedia.dll
MD5: f789a4a6e6c4eef2118e730eced56d4a
SHA1: 4f6660c11f87afbfed2870c8323a1986b5e6e842
SHA256:a14cd8c4259928ed814f32a505ccd57dd6290be7dfc36d837efdeac4d3713722
File Path: C:\Windows\System32\BthTelemetry.dll
MD5: 2afe6c107e4695dddefd9b9030aa83ef
SHA1: 5657f10cc87845d599244b0d82536f4c4df3aad8
SHA256:8748c581b60e84cd273cad784403f9b6c4bd2d2b661df1df6a7bb02c95da82ba
File Path: C:\Windows\System32\BthpanContextHandler.dll
MD5: 1e09c9a82eda5311ad5665e54a3270dd
SHA1: c1cb205ff3f4361ad06408e2522d7fa843b0dcd5
SHA256:73b5f195ea1b865455e581c803bc551706706be5e838278402f2ef5c6ac5df22
File Path: C:\Windows\System32\ByteCodeGenerator.exe
MD5: d7821da906cdb559fde997423f02eac5
SHA1: 362d8787ef3e06b7e585b0e2a45a002a391b08f0
SHA256:c986d206e5adee4f61272c0738795b201682990ec156b1d79d227a672ac7f744
File Path: C:\Windows\System32\CBDHSvc.dll
MD5: 1e0b950aead24916c2ae4b244206230b
SHA1: bd0844492f5f2b5a3f891a01b7ee39bc49f84806
SHA256:333e4b098ce4b120abfb6878bc5f5a60ef90d313b2876be364be9429d3e95717
File Path: C:\Windows\System32\CHxReadingStringIME.dll
MD5: 526516a45f8e75bd50cfd655d8135bfc
SHA1: 891dc0445be06eb965a23420faef6f623a03407f
SHA256:1a82d07acc2462d51ad1db314bd351d8ca429166194d34df822a2bf72167cbac
File Path: C:\Windows\System32\CIDiag.exe
MD5: 070b89f6dc382dd1611f9222af71cb45
SHA1: 9b4d5c73d334f838758ad83414555183bb275426
SHA256:38af822c1b7b5b1260b516659a14bd7102419f2335145c1e076be4de3ee40ae9
File Path: C:\Windows\System32\CIRCoInst.dll
MD5: 999e42a02a6ad8662ded3c9b958cd0a4
SHA1: 3ecb495352a49585b6fb82cb422e4bdc7b322926
SHA256:e32842c8f5fa8a890fb95fc53f9bb01cd212e09caec5c4f9f12c02b0f7eef354
File Path: C:\Windows\System32\CIWmi.dll
MD5: 634e19a83e24b336fd3928cf8ae1023a
SHA1: a70e4cc0c3ebbbc0d8e40ee40ddc915abc5692cf
SHA256:00434937973e2d513938b879b579bccdcd90ab20991e0669eebfe6be95d2e745
Description:
This utility controls special keyboard functions like hotkeys and function keys, on your Lenovo notebook.
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\CLR2CBrigde.exe
MD5: cc585af74330ed2855272a2e48ed67c9
SHA1: 5080e0fc2a00a2e22196c3a2ead6ad2db93b1936
SHA256:ed1685a7cf57c34e7e915171972e43500e2370b5622e59cd8a445627cea23656
Description:
This utility controls special keyboard functions like hotkeys and function keys, on your Lenovo notebook.
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_fdde6ecd49c3a98b\CLR2CBrigde.exe
MD5: 49b4ffeb5527cb7a7941cc5e34acd561
SHA1: cf8c8384e472b1542914030970bfaa5eadea5b36
SHA256:43e41a2e78d048f76d4a3a7f7f0eb2d2050e7422d88b1c649f5e7618de429885
File Path: C:\Windows\System32\COLORCNV.DLL
MD5: 00bc4fef1deab6248911486f201295d3
SHA1: 79b8f2c11d3f7e0b0e7133547fcd4b4f4c47a169
SHA256:c33f429ffd3c10792d6d9aa4c248fb11916622eaea484aba5ec6bbf353cff1c4
File Path: C:\Windows\System32\CPFilters.dll
MD5: 7f062a36bfc3e9e677b71f80ec61e609
SHA1: b1c543520cf568deb59cb47d21ab8d9fa68b5fe9
SHA256:1f82de8896dc01ce4fe5216f6bbebce60c7bfd4ace40b717520f284eba9c1747
File Path: C:\Windows\System32\CSystemEventsBrokerClient.dll
MD5: 5d9e364c76a9a54e82b638ec562001e6
SHA1: c471a75fc2f907e51d7c10cca306a9bc17bdf5bb
SHA256:8bf696567740979a517731900cf794fa69c0bd1b06e60a376db0bf0de603367e
File Path: C:\Windows\System32\CXHProvisioningServer.dll
MD5: 36bd554f5d412949298208f5cb7323fb
SHA1: 804191432c137225c954773913f44d45e0565ed2
SHA256:0c87c763356136382cf779b83d27b0ba65bdc9d30625f2cbf5331b5f32e32f8b
File Path: C:\Windows\System32\C_G18030.DLL
MD5: 9ee454407435a115e3e17994733e93af
SHA1: 357ff7ceac8a7ed1a41d95f16aa51ae37cafc1e5
SHA256:f750352275e0599feaf856882d811d4f1f55bb64fffe252eefb4a344418f9e41
File Path: C:\Windows\System32\C_IS2022.DLL
MD5: b6ab896ccfaf0c37681b07d2a938682b
SHA1: 9f297ebdd5dfb128912b4a188ffc9b20921fa1ae
SHA256:39c4fad2bc47dd1bcc89a35945d5a26905c860fdd752f500fb4e59c57fb8e9ff
File Path: C:\Windows\System32\C_ISCII.DLL
MD5: 00c6c9668280ed3b53f44dcbf2d56b27
SHA1: a9998314c92f9a840708ec2b7de1f25391e2deab
SHA256:2c20ffb9a93d78224dc41b5af21d091af5e6963945e3d3ca844fcb7518860c96
File Path: C:\Windows\System32\CallButtons.ProxyStub.dll
MD5: b5874f2d685716e626033a2ff6c1a2e4
SHA1: 86b8a2af9f7a3855ff69e15afe1aec884045d8b6
SHA256:895877a6985f7ff37fbc0f0cd2b1a055c51b6c779c304a5bd5c6b4f6c5f7a7a1
File Path: C:\Windows\System32\CallButtons.dll
MD5: 0d9fff6be3646e65c3ab2b7df55e16df
SHA1: f3ecb0a033ff3f6675eb81223fb2f9bd38e05941
SHA256:c2891e81decd8ea2f32c362aa16b359d538ef93aa5e4757b180c5d15e28b7a87
File Path: C:\Windows\System32\CallHistoryClient.dll
MD5: 3367564601ac2b1c87db2a491362d016
SHA1: ac277e561886c971f8749bda2bad817669ce9582
SHA256:7e5fb433bf9eb3acf93680075e5a1932cd5932064096ec52eeacaa504789f7c4
File Path: C:\Windows\System32\CameraCaptureUI.dll
MD5: 8357d101d7cbd4c58915d76ac80d2690
SHA1: 7fe4682670a3d9076bb88f136419e1e6c84396f9
SHA256:2015ad922e92738b5162848cce9530eab812d40e8134baa1f93bb451abc7f5d3
File Path: C:\Windows\System32\CameraSettingsUIHost.exe
MD5: 900c4611daa2e1a0690659a0fb12f7a8
SHA1: 9e3e1b4bbb25cf89e182bb12dfa0ccdf5a62d758
SHA256:7c231a74bbd924bde1f7f9b0cff93a90de17d2522aa5ca69ac125226c8ef0b71
File Path: C:\Windows\System32\CapabilityAccessHandlers.dll
MD5: 127fa3f2070ce8c9ce006072d74b27c7
SHA1: 9104268e6fed9d2afd3fe7d462e07e7062ff3636
SHA256:5ae2a04fa1939147e857d2c25689d3193d3d583b4030b7a5840904487bf39258
File Path: C:\Windows\System32\CapabilityAccessManager.dll
MD5: 984e3203393508bbe978c20820d47fae
SHA1: 7a35c6b3696de8dddb08dbd36f03e973554d27fb
SHA256:5c2cd2318cf359cd465fe8df4ed9aa63ed747ef229b43fc63a562bb35dbab60b
File Path: C:\Windows\System32\CapabilityAccessManagerClient.dll
MD5: 3b95d2330c8562ef2f8055f33eb3efad
SHA1: d647ea07eb20bad13c21d4b2461c4e5f1b8fbc67
SHA256:a05b279343d0d68a843eea364ae7588bdfe388f039187531afc2385cb92a1d1d
File Path: C:\Windows\System32\CaptureService.dll
MD5: 60167ab2b6e5eef41b569581b2918ab0
SHA1: 812c6191d245bcfb08a92ce318d1f49c1ceead2f
SHA256:f0359bc3b4ecf1400d150f889cc8625b3756db2e36c712a7e2583a1bcd3e1c64
File Path: C:\Windows\System32\DriverStore\FileRepository\dax3_swc_aposvc.inf_amd64_c28b41707aefc6b9\CaptureStreamMonitor.dll
MD5: 1f838934e9eb24bdf0b84244fb873f03
SHA1: 42b680d331bf043c0b9db878e8e74ace6bd7ef08
SHA256:1cecfee29896ee49f98853d0a8bd48e5017bcd3c5dd73bf382489243ea7554b8
File Path: C:\Windows\System32\DriverStore\FileRepository\dax3_swc_aposvc.inf_amd64_e9ebbe69987eef47\CaptureStreamMonitor.dll
MD5: f5068cc26961412c2bc12444a697af03
SHA1: abbd7208a697ced1c6fb3ddbf32db0ff0a6908bd
SHA256:5e66578509cd73ed3f27d93853baeeb175ab2f8f1dc7e1ea0c43041ba28d2e53
File Path: C:\Windows\System32\dolbyaposvc\CaptureStreamMonitor.dll
MD5: 43fac6daef0cc44dd9ac4a50ed9ba65e
SHA1: f4e2ef3bf942fbad50fddcceb5fdf0a9b375a695
SHA256:8de2fa2f4ca159017ddd0878afb85bd94b7581bfca40cf8d25bd806d95d57c1f
File Path: C:\Windows\System32\PointOfService\ProtocolProviders\CashDrawerProtocolProvider.dll
MD5: 8b78d0cc77ae19d5462e8df99ce35491
SHA1: 59cb3f1575b313e1618bc5b8bc63c35b3760b7c7
SHA256:ac11453e4f1d06d462d02f6e7c6c4bceff43265608708b9ae459fe660d657b32
File Path: C:\Windows\System32\CastLaunch.dll
MD5: 607cba5f7f514d6a1628e76307baab59
SHA1: 30cc0aaaf48dc3252a916e0ae7d1e9fbaa23d55b
SHA256:4e8e65b888a59eb89243f66fee26c717d923c92ad16c9f326ff9e437c54f038f
File Path: C:\Windows\System32\CastSrv.exe
MD5: 64d579aa479da613125809e88c3a1a94
SHA1: f750868766fbc955a8e22f330e382261709f4305
SHA256:44fd47befdbcc76a300534b7d70f203728295909c41f800c25b95fca999b25f7
File Path: C:\Windows\System32\CastingShellExt.dll
MD5: 79b470570977995c2ff7e314bfef9b71
SHA1: 8accb79e08fd6396108879f00d595e2c3d976a0e
SHA256:53d3c3cf6b7733902d6edde2a40464a0bd48cd38d6d7a3b2b22f745a595a2558
File Path: C:\Windows\System32\Dism\CbsProvider.dll
MD5: 57a9a702d5f51b625a869cb6ac0ede0f
SHA1: e5db4003f5a82ea666bbd70083edcb9ca38446b4
SHA256:b19a6d57b76593369e7e06cbcc5bcfd03e18adaa3934fd59c8705213fb5779ee
File Path: C:\Windows\System32\CellularAPI.dll
MD5: 053f3a11e7ea8aac242b0ab92c43a54a
SHA1: fb43a381fb8c0e53ea1b6fd106c0c8751755bf74
SHA256:89b0f515b720f0b56259610148815b06d5d74ef30bfa14a5466a96a060e63ca1
File Path: C:\Windows\System32\CertEnroll.dll
MD5: 7f589513f3a8c4f7acc28a5922c5cebe
SHA1: 8ce52482ac6340d16c2e6ad36281d2cd4b8a687f
SHA256:ab7492318518d608a1e4760120891e6095e4ab0a46deda6506a206909432d2fb
File Path: C:\Windows\System32\CertEnrollCtrl.exe
MD5: 2593e73f6acb808dcc31e77671f1e893
SHA1: 4ba69ce26473442051efa3c421e0c4325db73f02
SHA256:a62f33900c3592886214c2b939cd3ec8a6d9709ea8571ab6f14fadf3cb8b816c
File Path: C:\Windows\System32\CertEnrollUI.dll
MD5: 2e5fa5d5243bab4d2cc268b125b9efe9
SHA1: 12d685f1abb00fbd77a95a6e3b40c08b49f071b9
SHA256:b2b001bb1aa353d44f60eb62277b355b62a45d9e12eb35fca5cc1ab63ecf641d
File Path: C:\Windows\System32\CertPKICmdlet.dll
MD5: 73d83ec84419b2b2fb0b23421d3bb01d
SHA1: 620c01145a649cb846d57b552e998e41ea849aa6
SHA256:e5bb220313b47d965bc1406425c0ab108350f6a90c95976253589dcc3b279a3d
File Path: C:\Windows\System32\CertPolEng.dll
MD5: 5442b2ccaa03fffb938933eece00ebd1
SHA1: 2420dae865bb7a165ed423c3cc5f6b294beb4452
SHA256:07fd3556c5bf6de8b469ca162aa828f8c1db3093220fe4f037d7f9af18093869
File Path: C:\Windows\System32\CfgSPCellular.dll
MD5: 7b6bf7fc71c670580fcadb58abc5ab1e
SHA1: 561ca885562a251a7b26bc21c7fa92e8cd71f8b3
SHA256:7b37acd016c7ef0516564c69537882b711414af087dfd7ea1cb363992335180c
File Path: C:\Windows\System32\CfgSPPolicy.dll
MD5: d02226c59c5b31a48c78b74eae02b97c
SHA1: cb11ae7bee1772d791556844bd596f043fa9f1f5
SHA256:5665c1299fe77f02d7c2b65abe6db265ff3b90f02fcd4d8f18782869cca14727
File Path: C:\Windows\System32\Chakra.dll
MD5: 54aefc6c14cb56ad95469334d7a1e05c
SHA1: 750376cf5a59c5766f3bd658b9137d0b95b85c36
SHA256:8789235785c008ef74c452fbecf0220be920f90525c6a9fcfaf38cebc293413a
File Path: C:\Windows\System32\Chakradiag.dll
MD5: 137375cebe067422e68230d879aed5bb
SHA1: 8f8de55a2202ae792f84d8bf1ee87aadff3c8ff5
SHA256:a39862c5495be1022171a2cfa1b13e55484fd6b7070e1c16c6877f4d9fe4fdf5
File Path: C:\Windows\System32\Chakrathunk.dll
MD5: 6d4a68487cde5ca1d49904d88075b9e6
SHA1: d24df1f96829a02b46b2ff456132a44e1e3ed646
SHA256:6a0719605ba720bf092cad2977b23f280a7362f6bb0e3ccfd12c32e0338f6b02
File Path: C:\Windows\System32\ChatApis.dll
MD5: 6872c37e1d423e6a3fb8daf9b095f9d7
SHA1: e489970b2b7e8d5dcb6a0acb2cb4af97074e3f39
SHA256:051f67eb85c05b189e7c77b2ce7b6b52fd21e5566c8815b2fb25bfafa6bfa66d
File Path: C:\Windows\System32\CheckNetIsolation.exe
MD5: eff925e5954adf7ab64ad2c22f523afe
SHA1: af969d7f004bee9937ef4218a2c59444638a0647
SHA256:e498442843b2323968d77b899c16c4e8ee314f9f8948827884f81cf3d402d2ee
File Path: C:\Windows\System32\InputMethod\CHS\ChsAdvancedDS.dll
MD5: 42c7fd994f92b5cb58499eb801a0b5cf
SHA1: 8bb8a829afa1e0c31d0ac7a2c56eaa6e58f381a0
SHA256:ec83729b6a83e76af29747778b57c188fc3574f9f0cc3f9263d2acf05e6cff90
File Path: C:\Windows\System32\InputMethod\CHS\ChsEM.dll
MD5: abbf768b93151ea268a829f2a41725b7
SHA1: 99a97a6f8d260d862cf1312634f92205139c3186
SHA256:9124e88e24ed09ec1c935a71ad4f1b1a8e463853581f97dd907c38566fbc8cc2
File Path: C:\Windows\System32\InputMethod\CHS\ChsIFEComp.dll
MD5: 1662fbd65d44e00bb568a1760b282a17
SHA1: b42d52dd3cfc3c8013b92e58f99ab2811661af22
SHA256:72fc856fe34f765fa03fb15d46a12a35aa2f02850073f5579d8ce59e277dcade
File Path: C:\Windows\System32\InputMethod\CHS\ChsIME.exe
MD5: 7248c1ae572111fde4f1574153db536c
SHA1: 9d3a06989755225e5ea30a0fee43aef4793ccedb
SHA256:7641badeb82768af0506f8ed25d613002a0e8f8bc9209b3df2c24024ab9378fb
File Path: C:\Windows\System32\InputMethod\CHS\ChsLexiconUpdateDS.dll
MD5: b3288010a7d452626f24c484a0e8ac01
SHA1: 3f9b9fb367e35bb1a71ddd74df066e8dffc486a1
SHA256:88a2c0194d41c78abc4d0456e5d96cb55c8f5d19f0c70894695ac8eaa8e94c74
File Path: C:\Windows\System32\InputMethod\CHS\ChsPinyinDS.dll
MD5: f991741b73e0abcb6cdc1295948582e6
SHA1: db91f1bb6399b10068d8fc9839c8f87466721021
SHA256:bff8b61d6740939a3e270941c3b6f4d693806fb1e97784645378ffe6d348bd71
File Path: C:\Windows\System32\InputMethod\CHS\ChsProxyDS.dll
MD5: 0b5056bed77918a59debcc88ac01090c
SHA1: 73406e6d2154ca3342b070bce9a158b1d3ec0a55
SHA256:93f7154d97a375036a15762153384709ce74b3326582312cdbb1995d0197bb44
File Path: C:\Windows\System32\InputMethod\CHS\ChsRoaming.DLL
MD5: ca676b2f0c0bf6f8fb4ed4d8c94cc394
SHA1: e64dc4a4007943b5b4983ab2d3c8cc5900fd54d6
SHA256:abfa6a517d246fce040931a15a153b98bccd7f9333c93a057db4b0e807306287
File Path: C:\Windows\System32\ChsStrokeDS.dll
MD5: 9337679f1b527db3359d28a3f289b183
SHA1: a7bc60c509f7c159a01c893f024e9e1c3b9bf9b1
SHA256:56ae57f1975130e2cd27d511f25ae53253ef269802bf425a3b93f0bdb3a2447e
File Path: C:\Windows\System32\InputMethod\CHS\ChsWubiDS.dll
MD5: 7c6b2fd33e9df31090bde733670188ce
SHA1: a37117e37424cc8d8972c54b95cf70a926089411
SHA256:49192ee7009bce5d0875e07dc809943a74b3b43833c2330e4bad04f6e8a080b0
File Path: C:\Windows\System32\ChtAdvancedDS.dll
MD5: 524ea917d320b70990c8bb8d868d79fc
SHA1: dbb069be12d0b3702a9be08c0488b1a2625950c8
SHA256:4cd292011ac6437791d6ad3b36e9a0cd245857424b15a6b9470f923740dab2f7
File Path: C:\Windows\System32\ChtBopomofoDS.dll
MD5: 7ef6ada9de25063b3e7d5af3edb3553f
SHA1: 2668ca148f8dba992a3b0ba36a793000991e859f
SHA256:cf7bfc41ef2afaedafdb007699466303ac8b807887a42a0351b5f2a01c994a8c
File Path: C:\Windows\System32\ChtCangjieDS.dll
MD5: b292cbc75281b13cad08b7fdc7910d93
SHA1: a7e5edd16b20eb82b1a5e9beabc4d9137a70ecc5
SHA256:57569ce1661cedcc6d6db44b86270beecb3a218d62df6bd7295fc42678859b04
File Path: C:\Windows\System32\InputMethod\CHT\ChtChangjieDS.DLL
MD5: c5ecf61dce333e5f34963397d26444fc
SHA1: fe43a86291abde2466b61e3fa7a41213a625fd1b
SHA256:0cb1c4e1ead6f0de92fae1f1653b8e27323190450e655c8f054d7da9fb060a45
File Path: C:\Windows\System32\ChtHkStrokeDS.dll
MD5: 145fc84365bcad80e9a27d70f3c1da10
SHA1: 4dc2ccdeb03342a0f4af3931d7713882a8ee1823
SHA256:8a420700b2392284001cdba586f46aaedbbbb3e7fc7ddc8841c096e6b96ae25d
File Path: C:\Windows\System32\InputMethod\CHT\ChtIME.exe
MD5: 626766ae1f607f2de079b11524d24a28
SHA1: a433bc7bd00fc3dfdeb57587a63ce7629b16c4ff
SHA256:c8a56a1d585129d0d2c7703992e26f4cfea7eda92bc7c772c7bf2b8d00fd977d
File Path: C:\Windows\System32\InputMethod\CHT\ChtQuickDS.DLL
MD5: 6c46cac8f87a02b0e7737998be589b60
SHA1: adb89f8a4f883d0aa88acc3ac7b29a33f4ce587c
SHA256:ce69bee9178db52d7da6765a99d2cb50771879f009f048a8f5db06bc65c7a355
File Path: C:\Windows\System32\ChtQuickDS.dll
MD5: cdff647ac47f2e3d17af1b0982a7da68
SHA1: 073aed983cbd62c69e0cc9b1d4a72ac2d9248fda
SHA256:60efebfccef389d5ccdcac74c1f6f72c902b7f57e0f03bb56944d3e04ba131f1
File Path: C:\Windows\System32\ChxAPDS.dll
MD5: edd56a357bc29c770bf29ada85ecca44
SHA1: 0f40b0c2666f6caa72a02be8a3af5277597195da
SHA256:b4ec4b721934655a5f02343a688b4b7479ee89f1b2fdbdf44aa3b0810d0223b4
File Path: C:\Windows\System32\InputMethod\SHARED\ChxAdvancedDS.DLL
MD5: b6735125434d7e9e7a96ab40615f1aa2
SHA1: a149a0dff1d971c6250497eec8b221f75e76d0b1
SHA256:cafca6f0e6dee1d4aa33bef2ec0116b7948d5cfa5c35df2e31f8c398128ef230
File Path: C:\Windows\System32\ChxDecoder.dll
MD5: d3fc58a2299ffc99b3305aef03508aa8
SHA1: d20b682f7397dd0725c467c6177a1d47156def4f
SHA256:cb45e5420778fc087053038b6d11a27aa4399da5c1dd085bad594a9284f1aa80
File Path: C:\Windows\System32\InputMethod\SHARED\ChxEM.DLL
MD5: 6226a9c03ef10ecebc0c4ce6b6ba355e
SHA1: f0356a63e2d7e77246722f4b83edd9569175bf3a
SHA256:88c5348e8c32209f9879fdac4f4f2cc039e4588748d1a395b59bd391e0dbd06d
File Path: C:\Windows\System32\ChxHAPDS.dll
MD5: 14a7735fa8220480265b93866361b863
SHA1: 2a0a30e799750584fc193bb9711b210f68cac1bb
SHA256:cecb2d18a370c21d7089670822511879c62b349370b543c1dfd8c8d5f97e6cbb
File Path: C:\Windows\System32\InputMethod\SHARED\ChxUserDictDS.DLL
MD5: ac0a1d593f326d888a5c1481482a5523
SHA1: 27b6519d5f0a497f314aecbe0094e80a28d0357c
SHA256:6239eb15da0ce2208747cf2fabea811c3c3127befc1490611a5dd641627ddfab
File Path: C:\Windows\System32\CleanPCCSP.dll
MD5: 8455c2504655d3167719f7fe941cf248
SHA1: a8fb2160933374af8c088848a7d927383f39792a
SHA256:9c09234ce0b56682cdab29a6e6549d9161bec9ef5041133bdbc7c0a8abd1973b
File Path: C:\Windows\System32\migration\ClipMigPlugin.dll
MD5: 8dcc6b1505e8e848d604a184302223e0
SHA1: c2658ef1d341889e81ad89d51e129d146de52548
SHA256:0ff01c2d648fa02239c2f1699cec8868f7bb423c15079c9d01d0c6c125fe0ef5
File Path: C:\Windows\System32\ClipRenew.exe
MD5: c25e9b97f36342274a411093d300a783
SHA1: acf260b05ac47656125c90745e0b072de28d6c20
SHA256:72f9e2c09d1cbf9c22a4f07e983bec3cd9e2a160eb39439583cb764f8e4a015c
File Path: C:\Windows\System32\ClipSVC.dll
MD5: ec5a2ba2a3642f89d8626305218673f2
SHA1: 2b7fb638b0a5f143b5b550d9fe2fe5fb17cd0182
SHA256:e7c73486905f6cee7a21557c6e91d7ffe96970e71b9aa1dc7783806116771d25
File Path: C:\Windows\System32\ClipUp.exe
MD5: f4c7e9e9814051bff0109ea60974cc7e
SHA1: 1a3d869150948e71f3c940a442becb5e5fd849ac
SHA256:2626aa2039b24900978feb5c9eb10b0846e7c9d4cdff8fef6399d58210174c00
File Path: C:\Windows\System32\ClipboardServer.dll
MD5: 2e87698556ffcddd541ca05f1025dd2b
SHA1: d15817292488b6c7286fb8170a136ebc9d319d3b
SHA256:e9d437eb6e1c8f398cf0af82ee6ffacb5f06aa6e08bd19d50089844e6c7ad0fe
File Path: C:\Windows\System32\Clipc.dll
MD5: 592c463195089d66dd72c3c78079b07b
SHA1: f16c51893ffdcf5deb2871b2cabae9d174a6d7d0
SHA256:f2a384a148a92a376167586a66669b0a0e2c62cad575b95bcbdba202c9b9f385
File Path: C:\Windows\System32\CloudDomainJoinAUG.dll
MD5: 3f757b9bc374a57adc1296035c293bd9
SHA1: 856f5bc90684b2ee0a1c4302e05ef674c409d538
SHA256:8299b9e8e89fddbb4967c0a154e7d38a8b807e1ff0a226e8f1130c5b560a44a9
File Path: C:\Windows\System32\CloudDomainJoinDataModelServer.dll
MD5: f3e38ace986928b2dc04a74f93854206
SHA1: 7228a051880114a090bb071cfb47e212a497e0e5
SHA256:e002eecc7f24850062233388b8f921052af2d4551905be41d548016e4e14dac1
File Path: C:\Windows\System32\CloudExperienceHost.dll
MD5: 7af41a002ea4e2b74ddea3157e8819fc
SHA1: ab5503762a0b9696333ae7c73b6053c67b71e7de
SHA256:703521fea37a8735b7adb46a2863273202deac90caaf224f7fd4e2c5473184fa
File Path: C:\Windows\System32\CloudExperienceHostBroker.dll
MD5: 55b625ad3ef71b53f7010ad4b0744049
SHA1: 246928147ce9fae86c1341bb6776520b3fcd4c19
SHA256:a05d3df4cf6baf57887d9473bd82a7f5694d9b7a5a7432ea50e0e173babd648c
File Path: C:\Windows\System32\CloudExperienceHostBroker.exe
MD5: 2fbdf6f09f85f849b113657b78c9d4b9
SHA1: c7c7b919bf80f7db8f53ff69e274200e89e39fc6
SHA256:0cc732774c8a42c6aaf47dca6fc8dfd08a6f928bd9ef77f90d7fa27108d6f612
File Path: C:\Windows\System32\CloudExperienceHostCommon.dll
MD5: 1e3a55d6acfff5307ad076a2b9d6d1e3
SHA1: d12090da425a36eea692dfb130d5d9d13f271c0c
SHA256:8a443a3785d885a485acad55f9a4813b069c7b70b2279187456dc0ef374fd351
File Path: C:\Windows\System32\CloudExperienceHostRedirection.dll
MD5: a074205b36a5fe6998f23818ec18d5c3
SHA1: 1652436f0542f7d88ee48aedf7ab77cf10c66883
SHA256:a64d402e4edf01c3dd0b062ea721589cb572c5a776516cc64d4868445c6d5f54
File Path: C:\Windows\System32\CloudExperienceHostUser.dll
MD5: 0d69c83956f636a2f8bf83d05f04e79e
SHA1: 949de4a7e822cda01fc9b5d68842055d69ec182d
SHA256:f5dd3185b58f68350a4d2874caf52b8abffed2f56136d41a821b10096a3faf99
File Path: C:\Windows\System32\CloudIdWxhExtension.dll
MD5: 0099caca524963b6420a6ad477bd4bc5
SHA1: 0e4d845302e420d6a24496bf501b8a3c630e2549
SHA256:d60e61f3132f7ee90b90e0fdb1f9ff9646f0b1191840928970aa9863912d8634
File Path: C:\Windows\System32\CloudNotifications.exe
MD5: 07e42026ee58f7ea07979a600aae08af
SHA1: fc8219da94e00ffd017a7480f875d19adba9aa18
SHA256:cbdd33e0f2e856caab3a32da17290aef8b3dbc4f5e3aa357f3a3471ff7dcdaef
File Path: C:\Windows\System32\CloudRestoreLauncher.dll
MD5: e70d92b95459fcd6e1770a9c025e38ab
SHA1: 15d98ff629cedca52265cec9a628ad484407d9a7
SHA256:354a03ca4ed3c5d9f9efcae1dae46455b79e045dd9e4c08b703ed9817cd1fc0c
File Path: C:\Windows\System32\migration\CntrtextMig.dll
MD5: c6e935b5549e4d109ad7b0f88fc61c8a
SHA1: 7fbea8277ad1c805b0a050cf2b73874c44734781
SHA256:8c2250969f573732bdd801adc46dba34cab5dac675e8e3a4b59ceeafade23d2c
File Path: C:\Windows\System32\CodeIntegrityAggregator.dll
MD5: fad9c86b1547ee08a74c7b447cf39a96
SHA1: f27ed8432b8a30e6b5b95dbde514b0fe3e175a81
SHA256:689bcff43a3ebeaa277188d7a333596a2d5b56b2e05d7a2f2fa9e7797056346a
File Path: C:\Windows\System32\CompMgmtLauncher.exe
MD5: ff9690925244473ecc4c2e5b535b8599
SHA1: 14b1887a1979904ae2aefb582bcbdbb33df66a5a
SHA256:764ad199d40bfd87c0906470a816422ecdaa7caff7df97592922b068fa9c5f40
File Path: C:\Windows\System32\CompPkgSrv.exe
MD5: 3572dfd5b8c668911dd0564fd6e60610
SHA1: 8ca546a97662d9f88e9deb61fa27f1eeeaed5eb4
SHA256:c988f9db72e0c1ebe227ee4786db7675c304f98c6c1da916a20f73122c095127
File Path: C:\Windows\System32\CompPkgSup.dll
MD5: 34a44453f1efb0c244d128dece3dd8c4
SHA1: 0cabdc3fd4ed5055ba2912c8f69859dbbccc7089
SHA256:4d2574b7ebc6c13446c8ae22a83dd0fb47960d3e1d20932a5b633d41ed5ac1dc
File Path: C:\Windows\System32\CompatTelRunner.exe
MD5: b4d2d7ca1e3950c6e30ed3d5483da63d
SHA1: f215d9992687f8b9102af4d620621fa2bec349fd
SHA256:4ce32e6037563fe06558d4b25ae32d3ede48a423de341214b9a7a04135924d84
File Path: C:\Windows\System32\ComposableShellProxyStub.dll
MD5: 0b9d510215c90b8e5bcdcbb9f3141e14
SHA1: 67763ae83126935814caed5d5fed5c078074522a
SHA256:df58fb153c649791754821cf9e3b98da0f42a710bec7522d3d0795f806b013c2
File Path: C:\Windows\System32\ComposerFramework.dll
MD5: da7fe5d8c59adc725de80c97575bbfc7
SHA1: 9d181ee8bfa02def383cea353629908c15c987a1
SHA256:19a253934dc41f4638ae0b07d195f4611423ccbcd0fed9d1bf188cd5b5f09677
File Path: C:\Windows\System32\ComputerDefaults.exe
MD5: f14afa1088ff96f55731eb95f4ef8eb5
SHA1: 1b72a74a807e761ac407aa4a7a905e17ac201287
SHA256:3da19694f6c75b1c7df69f2dc87145ae21e8f3cee5936269190a51e4dd947c10
File Path: C:\Windows\System32\ConfigureExpandedStorage.dll
MD5: 39ea60a8bef4d9cd6afc068290e77e26
SHA1: 7b532d72516547f4fa2063a61ec29b23fce32fd1
SHA256:6f3e313316f2114ce2fecd96293bbff92dcee581391cc62c30443b058c70b015
File Path: C:\Windows\System32\ConhostV1.dll
MD5: 18d124a9ba66135af5e0fa9937f8da4b
SHA1: fb9a5466e2b1d75e619b182a50ddf9cca8514385
SHA256:e159de60ead16eb14db92d0187f39db7b94215c9fbbbc136df7e782a7ff5d4b3
File Path: C:\Windows\System32\ConnectedAccountState.dll
MD5: 77fd104f6858bc3b3680bfedb4dfa3f7
SHA1: 3b9232fb4b62c3d9883ab9248927cbd626829d65
SHA256:f1d4091f08de407c5c7bbcd65cc187bd4ebb5a70e4570c02cda3883be764397b
File Path: C:\Windows\System32\ConsentExperienceCommon.dll
MD5: 0cd3354e543506175a835abbc2c35dc1
SHA1: c21158cafdaedbdef496c9d40b84238c642b7883
SHA256:08d14d098ba326f66ce45fd0acc90db6f1580e1eea37acbc5f64b92b79cb19a5
File Path: C:\Windows\System32\ConsentUX.dll
MD5: 46ea2fc513a77fda35cf6356b9fb2f13
SHA1: 17f4fc826b69f3a417f8d3a3271618b71f164a89
SHA256:020e6a42712179b3c69889d401ff17d1dd176a59aa6501f4e26527bc655cdcc6
File Path: C:\Windows\System32\ConsentUxClient.dll
MD5: 3951b4c06a5570e9c9c23a41f0a4575e
SHA1: f197a0301f5b476da52dd9e484529beb994ec479
SHA256:d43438443063e3406b5b3a4ee6027b92d7431730596e2aad5821f05753efe614
File Path: C:\Windows\System32\ConsoleLogon.dll
MD5: e78239396fe1c5db4dfe1cde413fcb43
SHA1: 7cdb35091c3cd47ef53397caf6b259cad15cfcbf
SHA256:52fdd8e8da174551fd084bab753dc1da39b3db81dce493421631a8a57bfde89a
File Path: C:\Windows\System32\ConstraintIndex.Search.dll
MD5: eb41c06bd0cbea61a261c595906b845a
SHA1: abaf1bda20f489dd479574e2eea3a07f2026dab4
SHA256:ec5f6f2e05f70722da7f37d43f584c215142044a2a22b40e3655f3fdbb25c887
File Path: C:\Windows\System32\ContactActivation.dll
MD5: 8405a399fff5658930ea8985e35ecc2a
SHA1: 9842aed97b1a2470c655fc14193d707c8288d55a
SHA256:d9037fe710427e7bb836e0404fb45849e02276011fa5dcf33cee4a05ada6efff
File Path: C:\Windows\System32\ContactApis.dll
MD5: de697b66cde84dbe8e011efeb6529414
SHA1: ccc9230683fa717050b58711eb9ed56a0062a416
SHA256:8e259283ab974f33c9832d964962beaa715adfc56cbf80389831bafc6b5c7727
File Path: C:\Windows\System32\ContactHarvesterDS.dll
MD5: 843353327bf3205ddc7fdf2f3c9c5918
SHA1: 9bbd372a36f4b7d2f3ed9746b06e3da73992ae50
SHA256:f202db10183d73f9e4080af0da7f5cb1b3a5502782f2bf46b9d4c13bc8e01efc
File Path: C:\Windows\System32\ContentDeliveryManager.Utilities.dll
MD5: 150b05be861f4d8cf7812ffeec01c209
SHA1: 847e80ac5135d8316fdcb8e488f879cd2e515660
SHA256:27f053cad836a5783c7744f1eb17a7fbec40cb18071344cf7eb202328f674307
File Path: C:\Windows\System32\ControlLib.dll
MD5: 8c8cf14a95c427ddc4d4ba0553094fa4
SHA1: 79d6db681c52ee6d5fb5862dd44167cb46f97bbf
SHA256:5eb2d8674a242934f08b3484622c108665404771a2ac7a9584c2aff57afe1f10
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_01d078da8c0f4900\ControlLib.dll
MD5: 4c59525e00a327a63e97bf1529f51d99
SHA1: 52a2d4196c95d96fe9eea8f730ddf4948d3ff60a
SHA256:c839ee2ca5c98792989eaabd24b071ebd669fdfb183516f126e24c2e80b8fb0b
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\ControlLib.dll
MD5: 541c5ca15ef5ee10e366cce4ed059363
SHA1: b87d6a7a9c4c3871a7bdb60c826ebd4e867b102b
SHA256:c486cc7f4c4acf440e4e6fbfb51d1245e4716797203cd36aed187fad72093098
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_fdde6ecd49c3a98b\ControlLib.dll
MD5: c89a21410e09463fafd8ef492ae99675
SHA1: 9a1044955bdc4effcfe36186501a65329a511ccb
SHA256:ce76b2e25e96dd4703cda8613bb77b7e9b7ddfdd3d9a514ecc581cf38efa4ebd
File Path: C:\Windows\System32\cAVS\Intel(R) Audio Service\ControlModule.dll
MD5: c4fb2b99e8c2414be07484dc86dc0c52
SHA1: 6d871a75b3e0451ba403ab9e448cb9fb24be05cd
SHA256:f890655cfde96ee216f169b565f29f743b5a21d79bfecd4c0c8b4e67390064ee
File Path: C:\Windows\System32\CoreMas.dll
MD5: 654dafe21a50a28cab6ca3f8b19bfa8f
SHA1: e5755e7f2aee2fe2e42636a38756e6d32b28ee55
SHA256:98901a557d72bd528053ff262ee900cbea272e724284497b76e1b9947521e6b1
File Path: C:\Windows\System32\CoreMessaging.dll
MD5: d68babe182d5e070b373014a14222c35
SHA1: 6be4c3edd6f6439ff1bafb4bbb6335c333a88607
SHA256:7022a351184a3abae666c5c6c74bfc13445f85cfd938543a1395307e8d4441f3
File Path: C:\Windows\System32\CoreMmRes.dll
MD5: 9298dc819463df2221bd9e7cf3c7fd1e
SHA1: 4695aa6eb4762cd5f61422fe18bf4e814611dc98
SHA256:6ba51007b33f1d209e41a34377ced75a8e0a8b58b1a4e184925d3fb89841cebb
File Path: C:\Windows\System32\CoreShell.dll
MD5: 3fb0eb335367f558b6079b70d0e456b5
SHA1: b22216b4065c41818d013ff38f62977af5ddee7f
SHA256:fbb5736fe8b4ed85987c5077ef42ad42d4ff13f67ff402b7cf6051f9ffdc4b33
File Path: C:\Windows\System32\CoreShellAPI.dll
MD5: e01b8bd03cb2ac4eb5040ce324e616ee
SHA1: 3d67bcf18665be3fa2d7f06c44683d85fca297f1
SHA256:03330dc1ebae0297fc1a7c0d13d75d954c94b13c3290c4ac42c577c5d1a77785
File Path: C:\Windows\System32\CoreShellExtFramework.dll
MD5: 23ea6b57b5577a28c7582be14425001a
SHA1: 9e6dc2e7cfa4e87b899256c94f60909760a81ae7
SHA256:aafccff8fc8a613a43ef23730ba36a27d8896d5cf8627a8723dd17db2d222b8f
File Path: C:\Windows\System32\CoreUIComponents.dll
MD5: 80d91e310c3bc43dc9f9233d32db99f9
SHA1: c3ebb8f7e0bf4696dccdad187cc7a021af5e5fe8
SHA256:fae19e51c442e1a4c181cc4391e985180bf683653906af1cf74a06276862c568
File Path: C:\Windows\System32\CourtesyEngine.dll
MD5: 4676ce83e1005951a7e7ee872c18dfd6
SHA1: c4123b8350d9a3a22490fed9302bb09c0c6cb058
SHA256:27d81a158c20db9dab070bc9a180b93c5b8deb4bec40a1e30087e5ee5b557305
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\CppMicroServices4.dll
MD5: 907866bbe0058fd1aab00d1987de400e
SHA1: 5d23c9ff605964b9047aefbf81a9a0e0fdbd8201
SHA256:71f0dcb605e8fd18729bb77010c3b6bafd5083e5deb2eb638b9113b3603476ab
The _user_resource_create function in the Services module 7.x-3.x before 7.x-3.10 for Drupal uses a password of 1 when creating new user accounts, which makes it easier for remote attackers to guess the password via a brute force attack.CWE-255 Credentials Management Errors
Vulnerable Software & Versions:
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_d372a4ea3b959b1c\CppMicroServices4.dll
MD5: a7e27fd5bb6695bc2a14a41f8b8b4a45
SHA1: 6a9b046160621c8cf16fdb5954fc394da91b5c66
SHA256:dd14d9d4115ea94d418aa889e547dcb46610169c2c9d9110d84bff84b5115036
The _user_resource_create function in the Services module 7.x-3.x before 7.x-3.10 for Drupal uses a password of 1 when creating new user accounts, which makes it easier for remote attackers to guess the password via a brute force attack.CWE-255 Credentials Management Errors
Vulnerable Software & Versions:
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\CppMicroServices4.dll
MD5: c2ca16bab479686500186dac943dbd52
SHA1: 2b85f4cc62e5a741fa1dee75753a327a40cf72dc
SHA256:5a834abd8126a4da8bd7c3f7be6c08f1d273c3a1f154c206c63505fe325e0ab9
The _user_resource_create function in the Services module 7.x-3.x before 7.x-3.10 for Drupal uses a password of 1 when creating new user accounts, which makes it easier for remote attackers to guess the password via a brute force attack.CWE-255 Credentials Management Errors
Vulnerable Software & Versions:
File Path: C:\Windows\System32\CredDialogBroker.dll
MD5: 54531ece39f840e5cda237f0318f2fcf
SHA1: 943553719043c100626166c8ec13b24a38c632c2
SHA256:2021cc170e49687507f669e373a48ca022e6d9dadead14214cdbdf9ca4b25045
File Path: C:\Windows\System32\CredProv2faHelper.dll
MD5: fa2c30cfc9222213e71497562d00aa65
SHA1: 84c7f08cb7e1c83fdf039a20938a5bb5c9cfa6d5
SHA256:9b79b407f1070fb165e0a4e81eda8653141cb003412e6f1f43615f11ccff0bb4
File Path: C:\Windows\System32\CredProvDataModel.dll
MD5: f6c11e29ea6da9f5bbdc6dbcd9b8b337
SHA1: fbd0e2a3e48d006ce13111eb365878c64fc480e5
SHA256:354bf6837d42bc5325758496ee3d1ea508c87d54b82bcde25914eb50dfa82a8e
File Path: C:\Windows\System32\CredProvHelper.dll
MD5: 84777fdd2c11cef5ac7123dfe5681740
SHA1: 5aa15e02e3a3fde8f23921dd40f372873ed1d91e
SHA256:9121ba27c36567e6ddbe0e9a5e390e091dd526be1e254efd9f51b828091403b5
File Path: C:\Windows\System32\CredentialEnrollmentManager.exe
MD5: 295e4f95b0666dd1db2052732eed56c4
SHA1: c957cb39cdd61ba5cb27eba3fd1f94392921ac9b
SHA256:1b17df51ca048d2a0e65fd6a5e9c229c0dc6217a5b08da10265d3b286584c27c
File Path: C:\Windows\System32\CredentialEnrollmentManagerForUser.dll
MD5: 4e150c5086748c8e73c67ea95a79ec1b
SHA1: c43fd469241ce0df9989152a112f5db07ebbcf69
SHA256:a9af481c23067e1f2f0b25ce05c8186530be7d501f82d383f8140633a967ad39
File Path: C:\Windows\System32\CredentialUIBroker.exe
MD5: 431472b1ee607033eca05fd1e06be311
SHA1: 165f3ecaf59f093fdf337ac4d55bab740e8dd596
SHA256:08dc4250bf2b45e2d0382dc2f53dd209c35060cd415b50a69591dcdaedb37097
File Path: C:\Windows\System32\CryptoWinRT.dll
MD5: b655adf23013bfc44ef556dc3382437e
SHA1: 2547986566189c3b342442393c837129167abe84
SHA256:fb1b3357d1a98e51b3fff09f0925cbafddaae1043542726f74be283d7af6d974
File Path: C:\Windows\System32\CscMig.dll
MD5: 7a3b66d0b2a9bac8d73b3d11a7da3c35
SHA1: 08ece05fd83fb4748553a670c1fc9293cd4a17cb
SHA256:0a64e08db9bc2e013ebf0d24b38d1a0c303c390d15f65268e551942c555009af
File Path: C:\Windows\System32\migwiz\replacementmanifests\Microsoft-Windows-OfflineFiles-Core\CscMig.dll
MD5: c8245472f54c14d9de006566e987a270
SHA1: 9a46f7322c2a91f2cd272b828a8f3ce4f92f35be
SHA256:e474ccb803b98faf327b6dff9b549c675ba2da1eec5bfe0090fc332f930380f4
File Path: C:\Windows\System32\CspCellularSettings.dll
MD5: 183a4ba11da0518e81a28fc7ec6a7f7d
SHA1: bc3f1cdf4ea60111c131c39140a67871a71c997d
SHA256:cb354d5b309b93095c91f22dc5a63c79f606705cdafc023e17d876fa106837c2
File Path: C:\Windows\System32\CspProxy.dll
MD5: ecaf52662e2c7361d2edfd3b871875af
SHA1: 8d9bfc1fd840da5ecfe6d44742d9ffecf3cebfb5
SHA256:34c81cfc9523c59226fa5e54cf123c91812a65ccf0792552484e4a5d65dadf95
File Path: C:\Windows\System32\CustomInstallExec.exe
MD5: 32d0c9decd36b5a9831cdf8ce4e074c4
SHA1: cfb562d4406c1b3efd017b1c79716729debda121
SHA256:05d337c9d769deb0edd96217f2f014776c7391a650ab1a8f7a9b41f9a618cbf1
File Path: C:\Windows\System32\CustomShellHost.exe
MD5: 65709aa80e5994e154412cfff265824f
SHA1: 8b7ad35d49599029dd59e4ab30b0bab89be23881
SHA256:6d3681c62e488fb1be4ebfd81f573acc75cc745d726d8ea30435429805f182e1
File Path: C:\Windows\System32\D3D12.dll
MD5: 21363c82e46db67a9a53ae4202c5da15
SHA1: 87b5a7b1a18c524639e34a05b399cb1bdeac3c1b
SHA256:7652b804a1a632715ce90f59f5fb92e2fa3868d88b1a774baaf36e79c9c50810
File Path: C:\Windows\System32\D3D12Core.dll
MD5: 26c11b4fe9e94c9f0ff09556d8f005de
SHA1: 642e4de95cb0719b7bc58de1374d23e4c72e6883
SHA256:47241682bf0bdffba5149e426692c72859e9a03889c06a7d5c180542488402ee
File Path: C:\Windows\System32\D3DCompiler_47.dll
MD5: f894905617434ef142cb8758f59372a1
SHA1: f7ce90958a0bc12a94270c04a8495617cb243b74
SHA256:f642940ffb5dca7e548ba2270686798cf6b4c74b60e88bbb22f0991868cae3e5
File Path: C:\Windows\System32\D3DSCache.dll
MD5: c48e785753f9264a5bc6aba216ab9351
SHA1: 3a0ae997a3fd03289169b796dec9f094f8a36f06
SHA256:25a840fb1ea1c94cd304a082b261f4fe3b92dc954da41acf7ffbd663ffc2f91f
File Path: C:\Windows\System32\DAConn.dll
MD5: ee460c00f06b27773735ebcd4517d6cf
SHA1: 8bf1389dc6c7084d23c0af3fccfe4c877c85445b
SHA256:e3f42da9e4aba6927dea000f9d74167282755c7e0b38bd328e54bf1328f26d4c
File Path: C:\Windows\System32\DAFESCL.dll
MD5: 397ebe690d6ecc8b7093a708c26de738
SHA1: 40537c2bc257c7b888501fb4629d99b652c543b6
SHA256:00efffa6731d933f22425a52dbea878a2c7a646693fc8569fe971306306153b1
File Path: C:\Windows\System32\DAFIPP.dll
MD5: 9b565737c4f20ec5ff02793db3ebef83
SHA1: 849a6fb9de3411201dff16021d15a03899d64c43
SHA256:e09959f24068eabc9210fc5181e9db4a62559982d47751fe78ed70b1f9fe282f
File Path: C:\Windows\System32\DAFIoT.dll
MD5: f6ac5be35ac165f835ebfc9055dee578
SHA1: f956f07cfb321ada3e0fd524841a5f40d5a15641
SHA256:d156f973f1cb56b7efa215536130b4a7b66f0962ac3be0ed4f7a993528fdc76a
File Path: C:\Windows\System32\DAFMCP.dll
MD5: dbfc4db17c703ddc534fae86dee186da
SHA1: dd088f962198af66d957b349f5ffb432eaa425ae
SHA256:aa46b88593fd05df30d6e5433a7543c74a22af4b8419d86065f14090e013ab92
File Path: C:\Windows\System32\DAFWSD.dll
MD5: 3874b2d97be1f5dff384a2f2a3ffed88
SHA1: 8712bbaf9553bce641bfad34b0a485a41f511f3e
SHA256:5a035845d483e668b78cc0e5633bdf12beb908bb8fe7b66c24fe7ed1a2011deb
File Path: C:\Windows\System32\DAFWiProv.dll
MD5: 73d571f28114c49f5f70a4666191b849
SHA1: feeef3079dfbc6c593046182c11cec3f74c9ab92
SHA256:749eb83e2e48193d74883a0e9a77f390cb790f161efab9637b65c0c49458f515
File Path: C:\Windows\System32\DAMM.dll
MD5: 5836028f0b08714fb813c2a9fb105874
SHA1: 93682a969f65ac1f403e286b793017bdb1f7c120
SHA256:f7a4be10e846d20b2259dda770d6e86158dbe82ebc4bfc8dc1f742be9ddc4356
File Path: C:\Windows\System32\DAMediaManager.dll
MD5: febb134467408c7cfe742a08325f0145
SHA1: 297c4df407589d4c7c61068c06f2ad5242ee96b1
SHA256:7bf9d0f1382a73c5660b87c41be5713f88ca93fdd6fe05503cffcf5c9a69ead2
File Path: C:\Windows\System32\DriverStore\FileRepository\dax3_swc_aposvc.inf_amd64_c28b41707aefc6b9\DAX3API.exe
MD5: 61c986cc306c915ca7862f11e707b319
SHA1: aa4432b92ad795ffba5f78703881434f7dd3574a
SHA256:69d3535086ae7e2a24ef252b0daec38d59dc2927d94d4d625034da86e7d10ad6
File Path: C:\Windows\System32\DriverStore\FileRepository\dax3_swc_aposvc.inf_amd64_e9ebbe69987eef47\DAX3API.exe
MD5: f20711d040c2ac657e06ede445ac1e3e
SHA1: 3fc147491f848e22ad26c9f0adb0c9b54d7687b1
SHA256:0df9dca3ac16eee8eb178553dd94f97d8dd62b944284ccb46c4c2f613689c133
File Path: C:\Windows\System32\dolbyaposvc\DAX3API.exe
MD5: f308cf8a2900b2d2096355066eb2420e
SHA1: 1c240efea39acc4d2cdbab959c26afa1370a7e53
SHA256:528468ae06508c84fe44b797371658e5566f27f02f02f1c8cd13d3cb1dfb30f1
File Path: C:\Windows\System32\DriverStore\FileRepository\dax3_swc_aposvc.inf_amd64_c28b41707aefc6b9\DAXSSID.dll
MD5: 1e89dd8b2f9c054540e0819e569d3416
SHA1: 771af8b41982ce84c2ca2194a08d8db174eb3134
SHA256:48cdb00cb436d628031e152d08002ff29704e9111229e91c6bed04111d66d44d
File Path: C:\Windows\System32\DriverStore\FileRepository\dax3_swc_aposvc.inf_amd64_e9ebbe69987eef47\DAXSSID.dll
MD5: 2c5f7292d5c8aea125c8f34c4a97530e
SHA1: 9743f4d5706ef5c1b37b304563644fe6f4ef21e9
SHA256:6497e3d21ec8172b3f55c28d8d0824e27feb180fba083c8af9776d9f7fbecce1
File Path: C:\Windows\System32\DDACLSys.dll
MD5: 8bd3a2505ba5219b895f39549d943da6
SHA1: 0d1657e09ed2fc9dbd90cfa84636c40dba56afbd
SHA256:fd323f73a4d4efb6c459fc772a0327ca5ed0b52cbff1a8ac50314d3215743558
File Path: C:\Windows\System32\DDDS.dll
MD5: a8cea6708c99f953758e1ce1a04364cc
SHA1: b692d0c89960f1ef6795bf6590c4d87b4a20d777
SHA256:0c851da1054bd009cc59d6ecd78e668b588d31c3a75fce5cbbb784c0a80ee0bb
File Path: C:\Windows\System32\DDOIProxy.dll
MD5: da71d9b616d4483a7b18eb2d87815e8a
SHA1: 192270ea119788e38f8dd009d583588c6d40c61b
SHA256:79a916d8d68778f973c2815e9cbf864d01e625bb64c05f7fee7caa1359b84173
File Path: C:\Windows\System32\DDORes.dll
MD5: 82189415275c0ed0c80b476d3d53509a
SHA1: 8970482ec6f46fca2251f718f058bcff157be784
SHA256:67ed89e42fc994b82035ebb01f9a9bfcdc8382a3b52e4b1da18554ac74dbe158
File Path: C:\Windows\System32\DFDWiz.exe
MD5: 41abe514f48858221260f689dc214b3a
SHA1: 9a9942c909075c9530e568be74e904f0c3a40298
SHA256:548a3c7ec9ad1bb63f6cc21f4ae2a3b2317efad5b02031f542a18e3132022972
File Path: C:\Windows\System32\DHolographicDisplay.dll
MD5: 5d916776af39979d90059fc1e8dc6442
SHA1: 08e18caeb71abcebcb067ffe207dd35a1d68612f
SHA256:05bf5ca193f2b9514e9e81482c108c9eb7bb3fd7e316b0388ef406a01b600de5
File Path: C:\Windows\System32\DMAlertListener.ProxyStub.dll
MD5: 3d6f2dda02f7ad431e778d20ad7c0ae2
SHA1: 5aee0b1bc7886050223ea5a4aa672f659aba5cae
SHA256:be053616d7d5869d8304afe15ed6eccba2c86f06d036f1ddbcc02660e5eaa000
File Path: C:\Windows\System32\DMAppsRes.dll
MD5: aa0762c33bc340a4bb254529640cfe52
SHA1: 3fc8303986816f76d8391304044174007d2f1f80
SHA256:11b288f3ab890aa60d0dbd6730018ce86a62b5fbc9e5cc9caa966ee919801236
File Path: C:\Windows\System32\DMPushRouterCore.dll
MD5: 239f2b76ab664a5ff1d8affb92787b5a
SHA1: 3a62ad4b4108d908a29af98ed4a322309ffdfbf8
SHA256:f0db05d49fd9caeaab5a775c600f775346cccf05da9e6e37c623706c96d2c6de
File Path: C:\Windows\System32\DMRCDecoder.dll
MD5: 73f1706ec292d1f190a2882e0e104614
SHA1: e30f2581e001a748efd1ab43e334a849f27f9e23
SHA256:dfe585a54e3cc21d7e3ae0b149d60b073b7680ff6a5dd6f032a3a8ae3a759b5a
File Path: C:\Windows\System32\DMRServer.dll
MD5: 96adfeb345dc853c0dca1e4645ed80aa
SHA1: 565ba026619f8edd7a149709fecac3fc6717ce05
SHA256:622ca13624efca316e1da32a78c369fd585b7a5b82d0188c22809dc5c5d7c9bb
File Path: C:\Windows\System32\wbem\DMWmiBridgeProv.dll
MD5: 3ce32d8b1a510b4b96e9c0542ab9bcce
SHA1: da323fddaa496921d2f68a6ade280315a6e8da23
SHA256:e25939aa6508bf135a920dbba452525b38a0f3da4cb344b87402c69737e716a0
File Path: C:\Windows\System32\wbem\DMWmiBridgeProv1.dll
MD5: d7fed40d48978ea5084fdb3b94cd970b
SHA1: a84ab00b9fcea3d5fb316ccecac62669a43d69b8
SHA256:14d4615cd85a0e970cb2546aeddaf4aef8f8b0875bb3db8272641cf8ce363910
File Path: C:\Windows\System32\DTUHandler.exe
MD5: fdd0951a5f2f878d33edbb2474ca993e
SHA1: a1f0aa18cdfa6eb81eb17279ac667b5875905097
SHA256:7e17bbcdd93db4426ad129ea494b7109649f8036a8a08589382fafad1f17f079
File Path: C:\Windows\System32\DTUHandlerPS.dll
MD5: 6b5ccfbc1c3623269e5ee4cba3600217
SHA1: fb15aadce905af042790745a59218c9efd989ce2
SHA256:7e3835f129ecac6370a9ff7b70f16ed0d5dad1212c2c5337caf786a01572da34
File Path: C:\Windows\System32\DWWIN.EXE
MD5: 5120e490c0e8feffdd1ef45a479ffcfd
SHA1: 68cb834432e02e2e08b0ad0b099b25ecdf8d2ab6
SHA256:2541520798e4024f4cd828b4533fb60262921a72cd0d4cc319664f2328863f66
File Path: C:\Windows\System32\DWrite.dll
MD5: f3a94fb5affdadc81cea95bc1ee6e66d
SHA1: a0217037f722c65b411e86909b5bd357edbdcd89
SHA256:7d31758b5159554f0c3e2f97b9280cc2d2ea955df621f338a27b131f537abe28
File Path: C:\Windows\System32\DXCap.exe
MD5: 7770599a5c86d5e1a698cc13baf144b5
SHA1: d2ff8672e89f581a341327fa92f3bcae614005c0
SHA256:14971ebf33bedd67305ad3d8212bba6debc7ffaabb47a69d311e2a800dd145bb
File Path: C:\Windows\System32\DXCaptureReplay.dll
MD5: 2afe05f53624abbe4e0f83c072b5f180
SHA1: 1cdb09685936b6fb3647389450ecf696eb6934fc
SHA256:4eadf2b928010c507db8ce7749654688b98101b2b510a7e6971e8e8d2b08b57f
File Path: C:\Windows\System32\DXCore.dll
MD5: 012aad08f45d5007d5640b6ac69749a4
SHA1: 4eb8bf47381d321b2b749a238be28a0f4a7bfa76
SHA256:10b23290c452fb398c2906ef5ad1b88cd9cde5a11e2ad593b2826be9ff7ca537
File Path: C:\Windows\System32\DXCpl.exe
MD5: 46914b0f5e8f5373f34e49a57af84308
SHA1: 6fda84e78ea3cb537588db8e8bb94bba5c5946b4
SHA256:1215be1ad477ea792a72c63436fe7b6942154a05db3a783291a7ad23aa926219
File Path: C:\Windows\System32\DXGIDebug.dll
MD5: 3ea8c6c2e1764b99b93298874582358d
SHA1: 6f4eab4e676f8adb6d9fa4f6f42dad4d010eda3b
SHA256:e3c1b40d20c41496dd4f9c61c20e3f98ec43a932bc104a83c7577231bc3191d6
File Path: C:\Windows\System32\DXP.dll
MD5: 98859cae8e20288a479005ee7bf309ec
SHA1: ed0d50e2bd69fc60b7344f77914c6176b65652ea
SHA256:c9ef5b32b27daa7337314c1169aaa75a4c410c5126e3a5005b441d38a1109f89
File Path: C:\Windows\System32\DXToolsMonitor.dll
MD5: be95753f2ca56692accadf44478af4eb
SHA1: 8a3897c5b154b69d9ffd0e561c38f1c45713a463
SHA256:3f2eef2f6df076d07980f21bdc26790e7eea18baab5950af3f7346e379336059
File Path: C:\Windows\System32\DXToolsOfflineAnalysis.dll
MD5: 3b85ef49a230e59615c90c3b1943c88c
SHA1: 41748de2a4a8cad222d5704405afe5a4045c42f2
SHA256:7808aab58d3f05d11b3f2554f9991e266951bea2a41333156ea70644351c1005
File Path: C:\Windows\System32\DXToolsReporting.dll
MD5: d5227741e34374f7eab36104f7f1bd49
SHA1: e9dd5d643016fa0e17c78db387ecfe7a02e129ca
SHA256:df969dfb7f6fe63a42c3205134f3eeb9fbf398cb704e44f9929939fa90b30bd4
File Path: C:\Windows\System32\DaOtpCredentialProvider.dll
MD5: fb9433f11ba5f47fb068bba0aaf81bc6
SHA1: 64a0b7f86e85ae2f2856c6dd617a32fb9e408647
SHA256:29805a279ead03751e8790d0586a9c0e6817f51f880637be5412793c73bfb9b3
File Path: C:\Windows\System32\DafDnsSd.dll
MD5: cd0f0251497bdaa9757c863942e5c847
SHA1: 8aff4288f4a2f75737ce1e5816cc194d618d9ac3
SHA256:8d6367206ba7f38da3e2b5e8378617cada06fd08406d098850cc808f208e57cb
File Path: C:\Windows\System32\DafGip.dll
MD5: e5646118e42749e335f706df7adece3b
SHA1: 130916ca46d9fafd3a67685a110034142fcab630
SHA256:51d06eee490334f1771012033cf0dfedb6e8e3258dff37892ec3d10d5ba6e4e2
File Path: C:\Windows\System32\DafPrintProvider.dll
MD5: a0fd0d26b6623df7acbbff20f3988565
SHA1: c8ed6c1d6021e7666142ba4f7663e344fb00b9e6
SHA256:519dcc36f87e653ba89cc595d848a3270b325f600336650b6ec5a8d2218ee159
File Path: C:\Windows\System32\DataExchange.dll
MD5: 98b9ee1c7c42462bcbfc62d27fffbf57
SHA1: f973ce8c4f577e876f6f622f32ef09acf69385e0
SHA256:3ef497b83fd21e3657aea2cf31c2876ac33a613658a6f76ab14008a72daef454
File Path: C:\Windows\System32\DataExchangeHost.exe
MD5: 19471f8bf610e4e55f76e16163789d23
SHA1: a9101dff9c814eb28cb48a07c4d730db003f80d7
SHA256:ac19b3fa6c5e1c49357e44b1306a61fc53158aace00113cb08d76fd8a861c113
File Path: C:\Windows\System32\DataStoreCacheDumpTool.exe
MD5: b33d86c316d498b4a2b4be8233214bc8
SHA1: d428b9f0219797247cb2e687a9f32f79274438e5
SHA256:23ced129386be5163cc909b437d3afbfd572b3c318a09617d2e12e6e7cf94b7b
File Path: C:\Windows\System32\DataUsageHandlers.dll
MD5: 41a87d35dd41097c3041161c0288f440
SHA1: ee59e11274371dfa3f0b4234ef1abe6921f3b702
SHA256:a4d408be72f520e564c3780eb23b0bf0d7d3fed413c9b4556fe2b32b2835c8a7
File Path: C:\Windows\System32\DataUsageLiveTileTask.exe
MD5: 9d3e37fe2390d27014212a828fccab6b
SHA1: e387a884d97de40d70ec98a59ed8dc0dc400fdca
SHA256:021f11f0cb9570f13ce8a5640f546c32f2fcb06595a82b8ec6953d46aecdaa3b
File Path: C:\Windows\System32\DavSyncProvider.dll
MD5: 13aaab50dcbddcc3cbe7bb3c7f5cb9f2
SHA1: 30e45150d2ef69a009dd183a772b309349d615b6
SHA256:30b27c0a0dad803a25e5beb9008c3d6b39afed7983d4334cd175616929adfd43
File Path: C:\Windows\System32\DriverStore\FileRepository\dax3_swc_aposvc.inf_amd64_c28b41707aefc6b9\Dax3DapControl.dll
MD5: a1b75c9ffb010517c1ac4679ac1a6449
SHA1: c87d98a48e3fa1216a0a4adc10ec8a4e43dcbdad
SHA256:f6eb96a7a88ae90a0ccfe2bf5fcc4c84ad1b62d9e43e008e32709b659afef17b
File Path: C:\Windows\System32\DriverStore\FileRepository\dax3_swc_aposvc.inf_amd64_e9ebbe69987eef47\Dax3DapControl.dll
MD5: f2b8547ea0cb8fb46d4ae38b1c330840
SHA1: ff425675a0107975668b8d4d1a66e0fb57c7a481
SHA256:537dc12724332f386c38ae0cdd5e21705aeb86e69abb60601bb746a5e5b4a8e0
File Path: C:\Windows\System32\DriverStore\FileRepository\dax3_swc_aposvc.inf_amd64_c28b41707aefc6b9\Dax3Ref.dll
MD5: 55a1810818f0328357f8eabf7cb8f0ca
SHA1: 73c9e3b4483c7b7d8e079aae6e532210d46cebd4
SHA256:5c39c3c4ed43bd5f149a3aa66780311eaf7a35330908d48ca0c0a804906e4546
File Path: C:\Windows\System32\DriverStore\FileRepository\dax3_swc_aposvc.inf_amd64_e9ebbe69987eef47\Dax3Ref.dll
MD5: 511bf262b0563354099b92bd54f986fa
SHA1: 6433e08cb0b0536b8af3a41ac05ae8e000ed9b48
SHA256:f3cdc013bc4a9b149b4c84475bf2fcb3327862bda97b184bd9b63e09e5e740ab
File Path: C:\Windows\System32\DbgModel.dll
MD5: 5e721890f3379988d0566e58ec486f64
SHA1: 15ff80856fde3029c3ce3d4f5327efbda09055e5
SHA256:7f24170db50a849426ba2aa9c802b41a15c8d464c8d6a71c7c2897a6ec272e26
File Path: C:\Windows\System32\DdcAntiTheftApi.dll
MD5: 0ed41a08d50cc095f90d69bd797ccff2
SHA1: 74ebbd28387a5599452178e0bfdacd12a78c3341
SHA256:cd28e8a085aee323c5dfa72b1e76119e74c65d5b8120248f41c6949f2b6414d8
File Path: C:\Windows\System32\DdcClaimsApi.dll
MD5: bb8adb76ecf729ae7c1e1243af5d6038
SHA1: c105047e1242c56ed7377c31af812336518733ee
SHA256:515b247e2f6045c7033f87d3ce2f03e606b27c96cc5acc45628a342bd891facd
File Path: C:\Windows\System32\DdcComImplementationsDesktop.dll
MD5: 18b820ea006ee6be78d27ac545952db9
SHA1: 78e342c214b710b7bc3716e7c07db838ae8911ae
SHA256:0c1665348de6b4322d2e98198ec594b6653c2a352cfad7bd6ab4fb0bb5cfde94
File Path: C:\Windows\System32\DefaultDeviceManager.dll
MD5: 0d5d0a941ae473b7703a06b0feeb6d8c
SHA1: 0fd46e5fc47ab708b645a2750a9300d17deaf73b
SHA256:bb9253dd0b0fb0ca98cdbff08b09a1327d2c9a426fbc186b6da0dc4c20ed02b0
File Path: C:\Windows\System32\DefaultPrinterProvider.dll
MD5: e3203c08a794360832ec953ff9e3aec2
SHA1: 2654eefa13d194c7406d9f4ee0501081667d910c
SHA256:3dfb3769a44aade6f86c6d2405bbf5fb7d7488a3d3bac9c42d2151cbb6bba35d
File Path: C:\Windows\System32\Defrag.exe
MD5: 073a737f87d42a79fe66f75496e4c7c1
SHA1: ccd9e089af5462bab0ca8106532b3dc46a42a322
SHA256:4eae5e09c798d4435f88e4b4131ea04f81c3b0095753f436dd10d054130795c3
File Path: C:\Windows\System32\DesktopShellAppStateContract.dll
MD5: 35b998a833f792c2c685d7ec6ce8c3ae
SHA1: dc6be882b3d0f3ecb6d0c1bf63d790b52ad7caf6
SHA256:9f2904589e3d677898b0f16848b260a29945ba53329cafb3fad14844e281b396
File Path: C:\Windows\System32\DesktopShellExt.dll
MD5: 74668a3e305bee6626ff023253c0e7f3
SHA1: a7938995697ae81cb2853b25df492901922346ac
SHA256:a005c02a10a73e45706578316c2b48f169e0d82def9ded17509507cf97928b01
File Path: C:\Windows\System32\DesktopSwitcherDataModel.dll
MD5: 0b2608b89cb5d7ee7182bb92e3d453dc
SHA1: 12d4edd851bca0cf9ccdd7f72df5da73754a27c4
SHA256:3d7fc5a0075facbd3e9d7ac85988812a03a717a4e2ddaa1b993ebd8f561df1b1
File Path: C:\Windows\System32\DesktopView.Internal.Broker.ProxyStub.dll
MD5: 8f5e94dbbe89377eb2bb7822e0c5e413
SHA1: c13ee83e2af6de3c09a55ba2b0643c59296fb4ec
SHA256:e89b1e49fdc888d7a272f0e6e426de1ada4bb9f8c2669fbe2f513df6e43f76ec
File Path: C:\Windows\System32\DesktopView.Internal.Broker.dll
MD5: 8924b7e14738020ca88d2f6a32ef9cd8
SHA1: 7b2d523280cfb3d23923645fb6fb12daf9d1bfea
SHA256:3371dc51e300ddc7efe18ab3f867b7266c9f57f0cf5b4715b9339e5d4de85fef
File Path: C:\Windows\System32\cAVS\Intel(R) Audio Service\DetectionVerificationDrv.dll
MD5: dc474c1b819d8a010c099ddb2a939d63
SHA1: 5183f417b69230f7c4b63830dca18ab4289a8e76
SHA256:6a8e3819ec2cb67f852d1674dbf72d3a403157432d32529923e4e9562cac23e7
File Path: C:\Windows\System32\DevDispItemProvider.dll
MD5: 92b8d2b4dc89793c4e12142dda85b317
SHA1: c81ec93962cb34e52bb6b93960cb4e34cfa7762d
SHA256:d18c4ff01602f86bd56a2edaa365f679d1d4d5a3e619c8edfda26c9b51ce8fe6
File Path: C:\Windows\System32\DevPropMgr.dll
MD5: 26ddd077ef713fd072d1a41af9215b93
SHA1: b177747bd71b615a40c111f5b80ceb110ea92dd6
SHA256:87769ca26f22062f42397b5d706c056732955e292c5762023ed62e4f669d06f8
File Path: C:\Windows\System32\DevQueryBroker.dll
MD5: c3ca9c3470842ceaebc1956b2c489637
SHA1: 1f355235a6059f89b936ff30114dcd9b67cf1f80
SHA256:7694beb838371c4bad41f63ebcd948c71c44dcad243393987e033bb49c38e232
File Path: C:\Windows\System32\DeveloperOptionsSettingsHandlers.dll
MD5: c58a9a160d29d509a5e9cae87cd53996
SHA1: 4b6720a21d939575735e24271d624d18ec7c7044
SHA256:dea908b15919882612b1bfa264e5b466a66e1dcaac79850424be4bfa7f064192
File Path: C:\Windows\System32\DeviceCensus.exe
MD5: d9cdb1ead57e55daaab887eea91548c6
SHA1: e5c13895c71f575e845d93c9dbed822569a09076
SHA256:d20976cbee1c09de8e3ea69a4963c59e173e23df69e9f5faa9d16469645522e3
File Path: C:\Windows\System32\DeviceCenter.dll
MD5: 46d32205959be2a61b197e3df36510b2
SHA1: 91d61ba776eacab1e478398ef6a59c0c5eccb273
SHA256:96923f5a5ac84289c65b972d914016d1053303de3e4acd540dabe264aafcc6cc
File Path: C:\Windows\System32\DeviceCredential.dll
MD5: ea09b88181133a759fcc5a54009e7a66
SHA1: d168c6a0d15676664597962c29773a8bb834e17b
SHA256:3aa6621bf1fa899e60c222fad7add40be204c85aec177b5e8686a2e98b36bdb4
File Path: C:\Windows\System32\DeviceCredentialDeployment.exe
MD5: f741167bf51cc5e634e2bb26985c22b8
SHA1: ef9df0b10e47a4156af137201e18e656cbf1376d
SHA256:07dbad61122222f29e98ae0377a13ae88f6173f36fd0ead673f7ed9f7f21053e
File Path: C:\Windows\System32\DeviceDirectoryClient.dll
MD5: 0ef0fc2f79347b6d85f63572ea770a37
SHA1: baa6f48d4a2018e72a8c57885599c0ff60e6a292
SHA256:cd9169b05c8419358a20ba5a9a0f4e99c7236aa86d681145fc56ef7fa90a340a
File Path: C:\Windows\System32\DeviceDisplayStatusManager.dll
MD5: 13893198ce0c3888f43563054dd1c70a
SHA1: 7838cd877dc4e83a434ee900ee91e24b6273fdd9
SHA256:34af9a3e03df2af33689876beeca9a1e2feacb45f89473d0fb4fc3e75721e84b
File Path: C:\Windows\System32\DeviceDriverRetrievalClient.dll
MD5: c617163b84d8199b0b5e983c03f962e4
SHA1: a0ef35eab9369a6b391b67f837bff1ad3c290549
SHA256:536226689a07cb18455da9ef63a81d1c9ef04a1243056ba14561cf2f2d47576d
File Path: C:\Windows\System32\DeviceEject.exe
MD5: abccd41e21586bb8a669e9b2f04cb65e
SHA1: a7eb7aa8f2d2ac46cd942043853a84b95655c002
SHA256:14a69b5e05a8496ebca246b356ab318a32df3b563e4f375c6bbae07e87b8de51
File Path: C:\Windows\System32\DeviceElementSource.dll
MD5: 1b50333f72f788b12f89c7d54f6bd886
SHA1: e50c3cc24d10d3e486ff135d89c8473e250f9e4a
SHA256:2f93a79d70b8cbc8c3718a55a22d3d9da6f5609eef19c36364f2932480fc08a4
File Path: C:\Windows\System32\DeviceEnroller.exe
MD5: 2fc30cb66c738d84120fcfa25eca5e85
SHA1: 5e1f85930b8327c5a95f07c07d4cf10ce3064974
SHA256:ce1314a121123022846e9d6cdcd6541c0bd0e6ad58519f57d6dab82af290951d
File Path: C:\Windows\System32\DeviceFlows.DataModel.dll
MD5: 8a5e357fa6b6e39a5adc5ef3f4a9cf3a
SHA1: b812d8f59f8f05cdcdd19216bc62b09a3950ae91
SHA256:37ad23bbcd9b26f7c4df5ea89507cfe80be925c5be3e71b7f76dbbd44f48c3d9
File Path: C:\Windows\System32\DeviceMetadataRetrievalClient.dll
MD5: 159b0e61ff8f5ad2fc34cb1810ff81cb
SHA1: 3b175fdb97a61ab5dd82b0705addfaac5e85fdde
SHA256:40b6eb409224f55fe7202eac70cbf7807cdc365eb2f3b4623f35529eba099807
File Path: C:\Windows\System32\DevicePairing.dll
MD5: ac0440dd41621dca51cff9a4e6fe3eca
SHA1: ce9ce19302aa27d5b61ab81e5a96e95091b60b8d
SHA256:4f65bbf88ab532e1e0d0d021dbe8a97075e9e1b8184ab777355d5bc3472d6554
File Path: C:\Windows\System32\DevicePairingExperienceMEM.dll
MD5: e52d76585bfc939fcd50680799511eea
SHA1: 3a6c52aac2b1ad5ca72be6b6edd7bad29e6b9dfb
SHA256:90b879a804f4da3d739696537c6362785aaf50583e9b798be0cef15e79d3e66c
File Path: C:\Windows\System32\DevicePairingFolder.dll
MD5: 4c390e7d6949cc63e0fbe4ac84eb3660
SHA1: 3333c8443d7c3d7c1881af2cf7f433cd4fc0272e
SHA256:0e476e217cb736e30fa8be81999899e6d33c19e00e0a5ae75ec93a3078413ced
File Path: C:\Windows\System32\DevicePairingProxy.dll
MD5: 3f856ed04534439c55fd96816af9b541
SHA1: 6f99084b83ce38eb8df8b6df3f1042bb9f310430
SHA256:c24844c53d0e923a313a3893c141128528313bfa799aa652e4fb4e5d2e0755b0
File Path: C:\Windows\System32\DevicePairingWizard.exe
MD5: 34ebf2dc65ca6c8ad8df441e8f4ea6b9
SHA1: 043a765e48d4768669d1837de9a0545fae2562b6
SHA256:cceeb52d586a37d3a1c5c0652e1c809c5e6bb46e2fa72c5f36e0448a53d75eed
File Path: C:\Windows\System32\DeviceProperties.exe
MD5: 02c5a4c5a452e248f805186b8bf41bf7
SHA1: 6d7e61d837a2e96a7168649d749aecf393ca7788
SHA256:15522b3b263d5f4a88a61162033dad8286d601985fd13edf04fe8e7f5e54ac14
File Path: C:\Windows\System32\DeviceReactivation.dll
MD5: d5a1fc5b18632906c9d40782108d22b6
SHA1: 2c0f0568e3874d4c7905534056c7fe1b6af7909d
SHA256:1ed7f070ccbe06f4e5072df0bffbde72906f56c50c04bc04073fd6afdc046f54
File Path: C:\Windows\System32\DeviceSetupManager.dll
MD5: 017f31db11cc9520cb8c0ac9fac3331b
SHA1: cab60c91fbf45202b4c8c35d7668662bcb0b9129
SHA256:3905fdeb50e7f9d2419d5087833622b774977f2dbbddd4da64a1cd3633489a62
File Path: C:\Windows\System32\DeviceSetupManagerAPI.dll
MD5: 662e36397124edd39d7a669cf3646fef
SHA1: 188caddb70a286d00965148c0e66aa437e29e5e5
SHA256:aaa653db4fba3e899f45a7a016567c593e4ae9091bc1ad9f4f85b87355bd1931
File Path: C:\Windows\System32\DeviceSetupStatusProvider.dll
MD5: 0f752da44cddb382f81cc6a63c16735e
SHA1: 789010b89d44a0def2c01e89471bc0a0b8c39622
SHA256:12491c8d3f5cfdb15b19ba682e3e41448d4bc2da541ce6af7e78de899354b0da
File Path: C:\Windows\System32\DeviceSoftwareInstallationClient.dll
MD5: a919cbbede8acaaed7002cd374652597
SHA1: 7e044044255193750eb343e54ddb207c76153c0c
SHA256:d974689e1f0655a9658fef159841a45418c6695506f9f170ff5c5982777e3949
File Path: C:\Windows\System32\DeviceUpdateAgent.dll
MD5: 8ca158d5d58742de170d2ec7bbd1d578
SHA1: 7e5e4065884e6c4646025724137939fba99d7f3a
SHA256:ddbde343b3f853a75ac4dd388fb6334f7afbebeeaf7c738f400c6b34a461631c
File Path: C:\Windows\System32\DeviceUpdateCenterCsp.dll
MD5: 200cf006045c9ab7f6af871c9bb7984e
SHA1: d31b9978032fba75fcbb0df60ecb65abba63c50d
SHA256:5fec1f896afa672340eedf466d96d2cee6a9b7d21ac65b75dc93fae48d1ff748
File Path: C:\Windows\System32\DeviceUxRes.dll
MD5: 21b2b11ac0c4550f2d1db7d241a9f1c0
SHA1: 24eb75cb8d4d50cf3e2151f964d127406fc306d4
SHA256:944be61df9f93605cc37e3f673ebafeff91b8da1cc96474e1392d35a113c0cda
File Path: C:\Windows\System32\DevicesFlowBroker.dll
MD5: 75558f36b47d6fa696ab075df22ab819
SHA1: 57d07893067c0dba07bd107f5175f6560d0e1104
SHA256:8254d55ee4592e74867489faa6978d55925f150b64fa6a912c35d80936aff25f
File Path: C:\Windows\System32\DfsShlEx.dll
MD5: 8efd8f45c9ad2a7953f03db655108f91
SHA1: 6586d77c0101b084c50125bb81e93f8b1436b18d
SHA256:e5eebd458f40da8170ac757306bb92c78aeece841a8a34fb711066797cd73f1d
File Path: C:\Windows\System32\DiagCpl.dll
MD5: f356cf2f06398fb42f0c9f9312e5ef6d
SHA1: 3d3edbb0c5a6721120964f137a181604cdd9118b
SHA256:c7ebcff1be577253b50e473792710e0dfba2bdd6832b7b719eb12c8e592ba3a2
File Path: C:\Windows\System32\DiagSvc.dll
MD5: 06e5c56f4bc24720cbaf4282895fa82b
SHA1: c49be642a28f8248969fac1f28047159b3063461
SHA256:028c7154c0104c8b91a85dd104927028114a01f48a44ecc62d396574c5c2c6a4
File Path: C:\Windows\System32\DiagnosticDataSettings.dll
MD5: 852e80959c72a0b943af3e3f2ec6ffe1
SHA1: fa8d2f054539d44eb83e77a8e565c3a49ae09e6f
SHA256:d21b11911f53c66f627df32a2abb23f13f6c0e94ef1cbd51bfe784a19fb8d867
File Path: C:\Windows\System32\DiagnosticInvoker.dll
MD5: 1270d212c4d5c6d35e04fc30c9113da9
SHA1: fd3e0812d644603988f6418d1de26f97bd2b841a
SHA256:fc5a556d4f74cd4693db7e8c6d7ae75e91fe38080c056f153e7a293860e462ad
File Path: C:\Windows\System32\DiagnosticLogCSP.dll
MD5: 9c63cb2e610e65627e05e3adb114d044
SHA1: 309c4671f73945ac8a54784ee620e4e56aa4f07c
SHA256:ea205d1598e581ff224426421f0ee74ebf4a604dfe5a35a92f4ae31f7ace371c
File Path: C:\Windows\System32\F12\DiagnosticsHub.DataWarehouse.dll
MD5: 253aa821cbcae72e14593e0916d05342
SHA1: e2cdc0bb191cbebe255ab0ea97327640d8e911de
SHA256:d51fbdc56afc31a102144a7496642c6c7a318991bf5c6f8d019263bb81562121
File Path: C:\Windows\System32\DiagSvcs\DiagnosticsHub.Packaging.dll
MD5: a68dace8ef7854b5858521ef9ebf0d0a
SHA1: 5a11cdefb0616f0709a154018faf3c0dc02452dd
SHA256:454e819f535723175aac24e740112d56d26033f585cd91404d8721bb41012d11
File Path: C:\Windows\System32\F12\DiagnosticsHub.ScriptedSandboxPlugin.dll
MD5: 32f6245ceec0886524ae49705771e941
SHA1: d16dbace767790824bee64177397b0b27df1c58c
SHA256:1482aa41d4474071733b264e8fa1df2ec68fac2f3c6724b1f99f8c8bcf56c332
File Path: C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Proxy.dll
MD5: 6aa9cb81ebcb23981a5785054efe290f
SHA1: 57f0dab97c48659dd4130c2f612482337d9eacad
SHA256:2b2df37b397e3dd15c59b74f73bf1e63488d76cf7d084fe1adfb2862da952103
File Path: C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Runtime.dll
MD5: 2a20039f5f0dfea44880d0bbe85e2152
SHA1: 76cc413720aeeef549d7153e64ea122915d0fd87
SHA256:84313b8c2e3630fa038967467bd46ab65f3e434bd17a3eaefb917cd5ac34b161
File Path: C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
MD5: 81e29cf9553e893cf7ae93cf11679f1e
SHA1: 79b6d110cbcb9f53242e1eaa4d27288bf03e8a71
SHA256:9d8bab8002f8cfa8e76590c84410ee70841d205d5a1e57a265586b20cbc9399c
File Path: C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.ServiceRes.dll
MD5: 24679c794ec6f88ae6e5c6859ef916b5
SHA1: 8b2609592b094502ac7eedc7f2f44a4846dd86c2
SHA256:7574c5132b16e6b3572e3e3b5c85ef17769e049372809117597978be5045f83c
File Path: C:\Windows\System32\F12\DiagnosticsHub_is.dll
MD5: 57d2ee5664d63c2f1ba9e362ca26dc87
SHA1: ec075bcbb30d8ff798e0a6a89119969fa4ec2c2a
SHA256:41472ab8bc923c39dd6e58886336c2dd15c9eaee28f8d3c92d83273512343548
File Path: C:\Windows\System32\F12\DiagnosticsTap.dll
MD5: 2582605facbff9a0712b1ffb1e0dcc4b
SHA1: f10c7bf4a21b629e191eaae501d9f644a489175a
SHA256:87b6e54d87faac6328c9b1bff6cf7897d1b627268afd0124c6caf42176a58535
File Path: C:\Windows\System32\DialogBlockerProc.dll
MD5: f9c749601112243caf82ebc6d5b21e2f
SHA1: 275adfe49c6e5f86a4dc5a320ba33d831419fe77
SHA256:a6b59ec1820ecb7fbc7cbcb064034def80480b4ac6f705ca299de7f9922599ce
File Path: C:\Windows\System32\DialogBlockingManager.dll
MD5: 745882101294ad36b53d8db4d4e88fd8
SHA1: a526df8037f885739c4eaaa88a34e3148647207c
SHA256:272d60f6c84c87a3f20b655975b42d9fce7d1c4fd22e3e5aa664fec4c2736db0
File Path: C:\Windows\System32\DialogBlockingService.dll
MD5: 4ca9ae004bfdba7ad0065f4fa8b635b0
SHA1: a4109fe8e26e5bb75e01fe8ecd2e154dcd8a5057
SHA256:344027d33f27820039ca3066564a754efa355ac64339bc345931ebaa2f128883
File Path: C:\Windows\System32\DictationManager.dll
MD5: eefa2633217dfee58b666a2129658b28
SHA1: 67f1628c796ff247f33fe88ce7b416429ee03193
SHA256:c40967e057537627f46cf90c8f06eb03545a3a03103ee1b2c6df8f8830eeb510
File Path: C:\Windows\System32\Direct2DDesktop.dll
MD5: 83b1c68e67787ac7fc541cd21a4f1328
SHA1: cd2ef2821d94bf1ed0fabea5c2a1c709b48ffe72
SHA256:b838a3c5b6216785fae1ea91a0d329e2f19b56f3c86e55ccaa5861b2b409d30d
File Path: C:\Windows\System32\DirectML.Debug.dll
MD5: 2ae144c2a281ce7543dedc83e817051f
SHA1: 34144f8786470a792a61625ba4f51fed75b2bae8
SHA256:34b84d3cbcfd58f16be808b8ea0639da61b88713a4297cb7e6b5c4cab4bd17c9
File Path: C:\Windows\System32\DiskSnapshot.exe
MD5: baf48da90f984a04a0db198193c9d613
SHA1: eae9d6ef144942b9b9ae793dfb1a8ef6f8805bb6
SHA256:1bbd9e2931a62767d69320442ed2144310bc84ebfd42b32845dc7b2d819a5548
File Path: C:\Windows\System32\Dism.exe
MD5: 472646bd684bcaac510be7f65f9a08ab
SHA1: 6affd43146aa832ef56bdb1fc46294361b554bb1
SHA256:6a2bc5111b7ea9c4c6fdca0db462187b8b9b1ef009bd2d28a2a0124e3d31b95d
File Path: C:\Windows\System32\DismApi.dll
MD5: 8f32dbf9e111e2e9dc575731e2d5f02c
SHA1: 6ca673389eabd9b160c4fd77ae5298d6dd1bf519
SHA256:82e58b0ede7f92adb42042b738da570a15bc5aabcf0f593030533a892aa5e3f1
File Path: C:\Windows\System32\Dism\DismCore.dll
MD5: 681186b5696ba7d46b6681c027a659ad
SHA1: 3501245c376942928cf7dfd36f343fe851566faf
SHA256:fbb5135de4f6a5c9422a0b218d676930db9bc9a2aea0f7219077862912455914
File Path: C:\Windows\System32\Dism\DismCorePS.dll
MD5: 35a07968ec37231249f3f072ae555e3a
SHA1: a6b5be5daff384d24e68c7d3d540e9edd1e95ce8
SHA256:e5f25e5a170cb3d165c3d143eae967b96ab80f88fb09176da8591b0b68c77e00
File Path: C:\Windows\System32\Dism\DismHost.exe
MD5: 97cb1e2fcab378421c4b91df0c9f8310
SHA1: 1227ce5f3a75bbbcba54708fcf73a131b0887a29
SHA256:e36bcf02bc11f560761e943d0fad37417078f6cbb473f85c72fcbc89e2600c58
File Path: C:\Windows\System32\Dism\DismProv.dll
MD5: ab0dbc4f05b33eaaa447e31accab8d21
SHA1: 7064962fbc7e1fdf0cbb13a44e587e28168cd299
SHA256:6a3c3f07bddbc3079873f8799f2c19adddc59f15d6b2dba6e9314e5626bfd2a0
File Path: C:\Windows\System32\DispBroker.Desktop.dll
MD5: 032e4913fc264344e291789677ea3cc7
SHA1: f6f6b6936759df6a91636e9ecb4fec89f14faae2
SHA256:d5a5ae066c3953551a1df38f7959c7ec1155872a6e391c843093e8911ff391da
File Path: C:\Windows\System32\DispBroker.dll
MD5: f54855550c013abc2a43f4060af0b0ee
SHA1: 5439253650c7f9dbb25618ebe0ffda33584a8790
SHA256:3e0e27cb1c89f85026695330dbe502311fa64a52b73fe4a58abe392f8f209256
File Path: C:\Windows\System32\Display.dll
MD5: f1735a276539c2600710e0c2f3363cf8
SHA1: 1fab4eafa238b75b1acfc54f17d82df865439db8
SHA256:bb30a70b809a3838d606e71b2c0dd6b1fb8dfe64e4c88a4a618c279b70a41b04
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\DisplayDriverExt.dll
MD5: 60ce74f9413cee7819d70968895578f9
SHA1: ada95f586ecb6c1036c86d6f2433f86d95fabae9
SHA256:8fb48515edc08ef56769c38c66d666bca1e2f1015250286a4563489e5f8954e5
File Path: C:\Windows\System32\DisplayManager.dll
MD5: 38538d625bae2858824737b665b24b29
SHA1: 64358e6fb01d4fdc36407818df8ba3bd26552f1a
SHA256:d42077016d21859273c20bd152e6fd7c11bcc3e55dca8f3617b39ddba02c4112
File Path: C:\Windows\System32\DisplaySwitch.exe
MD5: a0d99daf0ee7b05f0991c198c505ccbc
SHA1: 6379592e5c350f0b2784f90418c00d9b719eb917
SHA256:887ff47a1d4b9f1af7d058475e16209c7bddde48bf2f312fcba78e115936fb05
File Path: C:\Windows\System32\DmApiSetExtImplDesktop.dll
MD5: ef71a920af36197c7aa2e5e8c5e540ea
SHA1: c94459886b36425e48a067518b2f9f23ef83ab4b
SHA256:e1b696bedc98026e58ab267ac32ec0405864a8c1755cba859f40c4b322dd9222
File Path: C:\Windows\System32\DmNotificationBroker.exe
MD5: 82da4669c4de28027443c12ddd3b4494
SHA1: a7ed11d831d60dddfee45baf8fe97930fa6ff36f
SHA256:d67da4c04a3c92cb02af42ce533b0a423e75d0d5863d2921a03151703e401037
File Path: C:\Windows\System32\DmOmaCpMo.exe
MD5: ee9cfdbf45c3fa0fe8fc15a23ca2e0ce
SHA1: d8e3f857ae0443f0f61db5dc374716c6e44d2b02
SHA256:267c5bb707e9f580eec5781c76ca43ecfb4109c02a8615f6421d2924dd3f8c28
File Path: C:\Windows\System32\Dism\DmiProvider.dll
MD5: 0c2e5696f987350b0ae36e692d10ffb2
SHA1: 31b0eb2cca497dc532a61bcefe1813641049a0e6
SHA256:52fd26a88d386b906cd1034df69618195e98a3a2743fe4aa185c461b24d5eba3
File Path: C:\Windows\System32\DockInterface.ProxyStub.dll
MD5: 40f9df85e0f5268350dc81cf502205eb
SHA1: 93a58ed9abf18acce946741ed4cce7a020de7648
SHA256:02fbf96fe120dd8a77054055c1501ceee520a48f75c1d55fd005c804597d34ba
File Path: C:\Windows\System32\Docking.VirtualInput.dll
MD5: 3c3245ea494b0fdd6ef8ce56c32a7148
SHA1: 7f8d370d1b19cde17097bc59e550298f0e65457d
SHA256:620b94f118caaf51aedb5c8588a2745fe744e42765abd650ec2688b609e09db8
File Path: C:\Windows\System32\DocumentPerformanceEvents.dll
MD5: 3c2e8e9ab686546ae6f3a799d1c8d7b6
SHA1: b81b9df8a26ffff61e9182f8a6865430485fe040
SHA256:302475e0074c8e2007119af9bfbcfaa6e7df0ed83f32db5b78e28a13b72e96b8
File Path: C:\Windows\System32\DolbyAPOv2100.dll
MD5: cb36079c338efa16d2a44123a5b26ac4
SHA1: 24398466779cae4533ff3c4603f9b40a7e0ef604
SHA256:e144dc9c9e6c2162046424b80e487af937251da51ea73a24597fe9d5bf35288a
File Path: C:\Windows\System32\DriverStore\FileRepository\dax3_swc_aposvc.inf_amd64_c28b41707aefc6b9\DolbyAPOv2100.dll
MD5: f6d1e4b45bb4c4344f9d56acc1f51d5e
SHA1: eb885ea9300dca53e59bce0a0ab50b4389918860
SHA256:b23999965453a500b40b8ce63ce840526e2dfffea369e6c9be1b9d60200521f5
File Path: C:\Windows\System32\DriverStore\FileRepository\dax3_swc_aposvc.inf_amd64_e9ebbe69987eef47\DolbyAPOv2100.dll
MD5: 40eb0a11585e1295af5b9add0df3deb6
SHA1: 407099b69bc26a260f60971e3c5c664ea8789b2e
SHA256:80d03cc663b4fc0836289aa64cd98cb3ab5897c3d96821e68eb7ff17573e46dc
File Path: C:\Windows\System32\DolbyAPOv251.dll
MD5: 83c12687035a4934cd3df1730698192b
SHA1: 47fe374c0614aaa535d5b601d49c658f93acb512
SHA256:9ca4ec1fd6f545c849eac153e1f2c242a5d21bf1028b55d5f0e436042c3c64b7
File Path: C:\Windows\System32\DriverStore\FileRepository\dax3_swc_aposvc.inf_amd64_c28b41707aefc6b9\DolbyAPOv251.dll
MD5: fc4646e5058ef62f24b623e0e61cf32d
SHA1: 9f19a34b64c8944fd52bf1ed442f7cc158da4390
SHA256:b98fb2b5eac477881a39ebb9f59e7b3b7c79bd2844d83c295563b5b7e2e3e206
File Path: C:\Windows\System32\DriverStore\FileRepository\dax3_swc_aposvc.inf_amd64_e9ebbe69987eef47\DolbyAPOv251.dll
MD5: 15f9dc6ce7fc5b886b4f8ec8033af289
SHA1: f7ecbfae2d3b11f0453edfc1b5116ff58b53baa2
SHA256:6273456a27741e8deadab1a07a44665487811ecc399e4d7f2e7f6b1d7325519d
File Path: C:\Windows\System32\DolbyAPOv251gm.dll
MD5: aa6c0c53050c693fcd7e504345fa1d71
SHA1: 7d119acb1ab29700e15b2c7cfc19cbbfb6e949e7
SHA256:9c8e8714a5a8b020ac1876d43f1175aba42ae4ac96766312c555789c5e3203d7
File Path: C:\Windows\System32\DolbyAPOvlldp.dll
MD5: 0083fa8a312a7641634e46e16ddae908
SHA1: 51b2ecad70adac158c9dca197e490cca39125ecf
SHA256:869aeaf8a641ec64ed02c9b48dedddcf60123dc2cbc8dedcc9fa6c299c9d23f9
File Path: C:\Windows\System32\DriverStore\FileRepository\dax3_swc_aposvc.inf_amd64_c28b41707aefc6b9\DolbyAPOvlldp.dll
MD5: d8813c0a9ddd4bbb317c5e6d3c092eb3
SHA1: 67330d5143cfddd63e2f2ba3a5d8929885d560a6
SHA256:8c0a45ccb95c688a3324a8cf90bcbb24282a4676c48a941e5cc15b4fa5a0e1a3
File Path: C:\Windows\System32\DriverStore\FileRepository\dax3_swc_aposvc.inf_amd64_e9ebbe69987eef47\DolbyAPOvlldp.dll
MD5: eeb1cf90d9eaa569ac981c861f355a09
SHA1: 86ee7bb7b3b00a2963cc46fa3bf31b32933a7cdd
SHA256:fa96be90ad5daf6cae0183d93fc9c2246c0c546c01e9136de9714d48a28ebf51
File Path: C:\Windows\System32\DolbyAPOvlldp120.dll
MD5: 74084676e916bc7fd2068e37ad6d6f97
SHA1: 96d45d62ea15e5a2beeb930be6be3b992ee0672a
SHA256:ed90ff4030252d59a201b03268a646f8be61a6cb3bfabf00feb90709d74e479d
File Path: C:\Windows\System32\DriverStore\FileRepository\dax3_swc_aposvc.inf_amd64_c28b41707aefc6b9\DolbyAPOvlldp120.dll
MD5: e90c638296163d676fa5439d2d59d1a4
SHA1: 5c05839f0c3f02778c35faaeeb23607ab4f2fffb
SHA256:2abd2046dc7a4e4f01f8cc12afb1c58d4817f7b951b14c31543d285aa6bbffb6
File Path: C:\Windows\System32\DriverStore\FileRepository\dax3_swc_aposvc.inf_amd64_e9ebbe69987eef47\DolbyAPOvlldp120.dll
MD5: cbbdc8790b87182ca9ff2e2cfb8a09ce
SHA1: 653ffffc95183252366159ec707db7f2da87673a
SHA256:fa2c513e4d68cccb824a1ce3282b0e8f9f67f3d58af3b35a02f6bd6a22d107f2
File Path: C:\Windows\System32\DolbyAPOvlldp130.dll
MD5: b3957aef71ce22abd657e85f1aaedd26
SHA1: 6eba8143100a9a30fc2033990038239607a64f12
SHA256:314a02506a5032e3da6d9af17fa53aad09b568ff8ec3fce8fa4dcce9fe398fc4
File Path: C:\Windows\System32\DriverStore\FileRepository\dax3_swc_aposvc.inf_amd64_c28b41707aefc6b9\DolbyAPOvlldp130.dll
MD5: 298b89d901bf0abae0305a1c868469c3
SHA1: a10e4252dc904d575bf43ff4b326e467476c61bc
SHA256:85c97a02b52ec9ee583403bb9d4be496d7b4206dd69eeb863f1374f7cb55dbd1
File Path: C:\Windows\System32\DriverStore\FileRepository\dax3_swc_aposvc.inf_amd64_e9ebbe69987eef47\DolbyAPOvlldp130.dll
MD5: f431a094db7624093904ca5fb28af09a
SHA1: 74e31e1e6b5ab65fd9de83641854c7b22e6d4d5d
SHA256:25419a8ec852374db867ddf4103d100c76191e2e7702aae941b0da0806019bda
File Path: C:\Windows\System32\DriverStore\FileRepository\dax3_swc_aposvc.inf_amd64_c28b41707aefc6b9\DolbyAPOvlldp140.dll
MD5: 13a6f08cb784dbd786b475d5a6c81a1e
SHA1: 45bcf2d7ee5211ac65458fea829315d363fe80bf
SHA256:416b2474e1558d225fa1c3dff7839a4574b13863e9d6f6b926f1263321c3b479
File Path: C:\Windows\System32\DriverStore\FileRepository\dax3_swc_aposvc.inf_amd64_e9ebbe69987eef47\DolbyAPOvlldp140.dll
MD5: 14878b6274874ff33d858cd9fe257c6f
SHA1: 6480d5e0106ac74cae1980653a8b0a97577b10c6
SHA256:a89323f68200c7d248d923f879723f340caecb3a0662fdc29a24260aa332f3fd
File Path: C:\Windows\System32\DolbyAPOvlldpgm.dll
MD5: 5aba69d4a4255043044078caf3210fb3
SHA1: 57b22b4c99728bc862e5fb99f14a3192455b3703
SHA256:53405e42d0b9e541fdd8d486c15ef6849ec369652ad4d07f635f4dc8d191d438
File Path: C:\Windows\System32\DolbyDax3Apo.dll
MD5: ab5bc0a238ea8a2d819ebc5b8f2cbe4a
SHA1: bd2ca63a283c882f5d8de0e019c118ec92740421
SHA256:1d4efd0a1db0c9acdee56c31fd98369381082e2c71ec5d0008ba93a7c7aacc4c
File Path: C:\Windows\System32\DriverStore\FileRepository\dax3_swc_aposvc.inf_amd64_c28b41707aefc6b9\DolbyDax3Apo.dll
MD5: 40dd92f44fcc43f554a82101e0251d3b
SHA1: 96e2f0356a76deeb185e0186af6adb0a92d929ba
SHA256:7e22305fb9f79db5e2c5e5bc04790675fe87da5972c57a9454c3348c8e6f2045
File Path: C:\Windows\System32\DriverStore\FileRepository\dax3_swc_aposvc.inf_amd64_e9ebbe69987eef47\DolbyDax3Apo.dll
MD5: 73427f98c29f6bca33ab5088c614928a
SHA1: bb11b3229504fbd5612554464c9e381c79001bc1
SHA256:d6c4bdddaf0fed931b3043b36b5a73d25bf08cacf7d7c54d30cd25b8a9bd808e
File Path: C:\Windows\System32\DolbyDecMFT.dll
MD5: 73e6efed3c5f6079a762bf881e022293
SHA1: 91d50f367b8f61e20ffa3868541d06cb45b8aaa2
SHA256:e3b5f53e2bc241a5aca4aa0950d3ba430fedb9de30c6e53de84e9cae7539a7a9
File Path: C:\Windows\System32\dolbyaposvc\DolbyDspVlldp.dll
MD5: 54374884fb9b3a9b9efb4acf1b345c99
SHA1: 028785344690b24ff1f8f0255a96a15b19d5556d
SHA256:3036fd937cbcb1155ffa58d8c8020db21bfdf47b20f3e0728f7b70e322a24635
File Path: C:\Windows\System32\Dot3Conn.dll
MD5: 2aa59526bf99243f8cabc892417a599a
SHA1: e7197cf6725d9743c62f7f467fd69a5d5bbee1f4
SHA256:ce5d75a4d17ce367bd9fee92d2b5d683acb806018b52d478860d67810b4aece3
File Path: C:\Windows\System32\DpiScaling.exe
MD5: 109d8299c806bd19a3e9f34a0b5c0db0
SHA1: 20c1a66e2ea39f7c83e9a1541cdf20531d838d08
SHA256:1192f380b190aa0c6b531ba59b14a12c6346b642c3553ec9f014b68aac992950
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_4a3ae74cfa6c37d6\Dptf.dll
MD5: f41af611cc6305c68c2e0b567aa9f08a
SHA1: f00a08e28299bfe8dd6ac9994405afc93db46c05
SHA256:b9772e4c5f51e571489ee04e715c7e81049a95f6c10a046e839ff219302066f5
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\Dptf.dll
MD5: cfbfc0ba963e76ada315de7acdaa70c9
SHA1: 43076974c7a7f4a267c97da330da74ac3d1c319b
SHA256:6de1b8cc78b6bdddb9cc1760d6bfa7f6ef8a2aa90647dd89e0d80fe597250fc3
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_4a3ae74cfa6c37d6\DptfPolicyActive.dll
MD5: d9ee6ba0d0bc9f421f7eb13b5b453e45
SHA1: eea009da0558e458d95758709cf6c8f9a387efb7
SHA256:c9f70006ad7795927aad5bc3269702748d25a27920fddcebe0c0e39ffdccea54
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\DptfPolicyActive.dll
MD5: 1f357a420e894dab8afa480d7d31148d
SHA1: de69f34aa3064fce88d483d71642d9f0366f9870
SHA256:e854972946b0cbde0129cdac4470a0330c4b1b53023b224e9ec159cd8a635732
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_4a3ae74cfa6c37d6\DptfPolicyActive2.dll
MD5: 84bd478ed981ce39a90c611f63e3e931
SHA1: 8f3278d92cbca48bdc60709a4da8ed32cae0ded7
SHA256:11ce660fda37b5255d0903c0e9ce4589c9fa4cbf82c89bf520ea88e7ad21729c
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\DptfPolicyActive2.dll
MD5: 20ed14a7e8cd0dd7ad4a55ac83d7efae
SHA1: 803025e7917e41287c321818b7e58ab1145cf2c8
SHA256:3a29142d1f2ef6f33126b853cb466631f33f40d1b77c13e4e9be689f9c4825e3
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_4a3ae74cfa6c37d6\DptfPolicyAdaptivePerformance.dll
MD5: a2d6ad7b319c19218b5098ac20640935
SHA1: fbfbc7d6aaf1cc5e8b5050beb7a3628a7547901b
SHA256:2c7479a1369de8453822b31f8e8323c75a287ae633d94c08480560e83b46d299
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\DptfPolicyAdaptivePerformance.dll
MD5: a98c1d1bccc24177db086c75d000b4b1
SHA1: 45aa78fa0f991fd51b20224d60857d55db456a96
SHA256:4cd8e3842636fef0fe9c4f943914105281da53c3e7b6ea7586f9edfec8a4efb6
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\DptfPolicyAdaptiveUserPresence.dll
MD5: fb18fece9b6787a9f9e4a8466ee21d76
SHA1: 63b5c1ace120446d4991a57143f503ddda9d0360
SHA256:03c284035e6bee411845cb0cbdaa4bdf6bf7c59e072e5a812602ee4984acbf10
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_4a3ae74cfa6c37d6\DptfPolicyConfigTdp.dll
MD5: 8e0715c179e4d727e9c488ff9edc488c
SHA1: 2619423411f55d47191f73a48e525fb1ec6b7669
SHA256:36bc590119177205ed3666c003b0b6225e472a4cea50190a960d5dcc08fa3d47
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\DptfPolicyConfigTdp.dll
MD5: 50e672c7bf99bcf5285d5a26bf9b4f08
SHA1: af6d2c79edb6f2a5caf2633d5831d0f4a506737b
SHA256:bc0371ac4be6d3407e07a56f5b061226362fa9ffd38d22540ecb399940cd971a
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_4a3ae74cfa6c37d6\DptfPolicyCritical.dll
MD5: c395d491a6d7698254c7c8b3e8b04250
SHA1: 5f3605b41d2025e4766e83b4f34743766009d5de
SHA256:0bc6d5c33cf229833e496c6d0dba8aaf246d74c63025ff2933d2480d6a7d22c3
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\DptfPolicyCritical.dll
MD5: b8f8a3f28b7adfdc4e805fb085f7279e
SHA1: 9bdb6e1432a30342a028a08337dfa565ce317470
SHA256:df790c4e4bc6cf0793a48be9e12ab8670e9f2f804c3dd20d0fa322117090275f
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_4a3ae74cfa6c37d6\DptfPolicyPassive.dll
MD5: c138a37048920a1bf30b6ac14bbf12bd
SHA1: 6139de9a3bc30e63fb69fb9e033a1dfe2d39bc42
SHA256:594d030263500b367d832f96dc265aedf1971a025e6311bb9fa56603f9f19fcc
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\DptfPolicyPassive.dll
MD5: 185025623fd641648350c62da0b7e5c4
SHA1: 213252dd82f512c14767a5073c5c0ede670c8a3c
SHA256:2efc2dc41bfa60c6e8d9385f6921de9219fbe96ad0979dd40e4a8da5fea02e5d
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_4a3ae74cfa6c37d6\DptfPolicyPassive2.dll
MD5: 1e77e0f02d309fb83229001b0d0ab86e
SHA1: de578f9e3f7364dac3c487d4441999a00c7b2db6
SHA256:44a3d1e8c64824b73b5da127e47973e554ae986c66e7f3bc62dbd7f94016cd76
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\DptfPolicyPassive2.dll
MD5: 49d06667188a84d4637624fd47278fe7
SHA1: c104598c7acede8f9efb827af9f755338e66b88f
SHA256:a3249c1d616793a83ca009254d2ab59d405307da3ea59b629d97f3640432c2ad
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_4a3ae74cfa6c37d6\DptfPolicyPid.dll
MD5: 4bc1cda034e1ccedb8fb2bad53c7b72e
SHA1: 79978b332cd3814dd2e7e6cf3d7e8119d7abd7e6
SHA256:359e1a49bb73bca757428461f5e0ed95f79f4488f076f7169df25c86fd32ddf9
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\DptfPolicyPid.dll
MD5: 26700b38354f88e260dc68e7b0d23b91
SHA1: 16988f37611b9bb4212ff6402d645e06ead8b52a
SHA256:83ca5fb4be69a4ae8b33ad117162164cf2eac952c9bc185be37a1c1145bb39db
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_4a3ae74cfa6c37d6\DptfPolicyPowerBoss.dll
MD5: 394e57182db5b0c7ffc17550b357577b
SHA1: 2d0b47a5fcaad89b907f58e95a9c664a1a537383
SHA256:29a9f6450dc3d06bc793035cdd6ab40d084f975262e096b5dde8b67ce52c1357
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\DptfPolicyPowerBoss.dll
MD5: 3f5e3b994624e9b5b9364854a4e7fc7b
SHA1: 16d5484df8facc2de245790e3029766e168db2c4
SHA256:f4ff50359c84987d5eacf613dbd899a5c6a1149748554f813e14cb081958cd28
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_4a3ae74cfa6c37d6\DptfPolicyPowerShare.dll
MD5: fc45b148a54cfff44e5a2df1871de7e1
SHA1: 3627b959f35e1c41f2e5e1f037ba0213e0ada380
SHA256:18e603c68f581dc0f2f7b2d19a91e723e109a52df9a41153b027959032cde82a
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\DptfPolicyPowerShare.dll
MD5: ca9269dfbbf115d54916a86b945f1c8e
SHA1: 3a4105bed00805af31bb2875939f8489a0d185b9
SHA256:8ae3b36a0a8fcce35b39fdce49dbc5ed84e61814c82acf15180e6d533f0b88e1
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\DptfPolicyPowerShare2.dll
MD5: fccb3d3cbbcbad6736129c33d49e5911
SHA1: 9aa38f695ffbf2c1dd3924f3057c22aea784314f
SHA256:7a9663bdcf05ba94ed580d42a0885278879ce4f40e23b51944b4c7a432f7776f
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_4a3ae74cfa6c37d6\DptfPolicyRfim.dll
MD5: 1acacee09b565731308ce41d336e8309
SHA1: 7baf465eeabaf5011404bbd6efe57d206a716f8b
SHA256:2c6039da86cf90fa48fb0cc9bb9af68b7ef171874c766f63d16bf2e76daa9e13
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\DptfPolicyRfim.dll
MD5: 7d91f47e9a968882e5cb5530f7d2f260
SHA1: eb38d4ef3fb005e762b79529e97c30f73a7181a7
SHA256:3e372f3172f08f8e19012357eb2c2a991fa07175befe311218fd87502e27c838
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\DptfPolicySystemConfiguration.dll
MD5: 6ccae6d05a5c18a2fe2e61d9e214b3c7
SHA1: 0014e29bc4b323fed0e8e0f72303478ed8f4ca3f
SHA256:cd42ed538a821dc9c1b18dae1e6f2735bc828da3497eb3ca99ff1a41c46f9a7d
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_4a3ae74cfa6c37d6\DptfPolicyVirtualSensor.dll
MD5: 79e99eb62f03a383dac1e062f4d3e4cc
SHA1: d089fa21aac9ed271b38e13c09d4d50451a05db9
SHA256:dbdc81fa8d52a0c6859fab9e84c0d5f3df0a55189ea493df101be02266c6546e
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\DptfPolicyVirtualSensor.dll
MD5: b74036f0d1ec280c1b5bc2afa82ce42a
SHA1: 8c5e5f30ee0702e19b2ccc3db3da5ab5737aa0f1
SHA256:795bbb799d5e1e1efeadfd93eeb330155e07904595b8795be93771f806441755
File Path: C:\Windows\System32\DragDropExperienceCommon.dll
MD5: 4f41057d24e55948d4699f1e8a226cd3
SHA1: 6b0bdadc010dc54480b4fe23c6653c908fdaf3a8
SHA256:e59b26f21701f670d2fb9a873b71f49d13bf8cbb243d9a43691812a42bc89158
File Path: C:\Windows\System32\DragDropExperienceDataExchangeDelegated.dll
MD5: f93e9afe03804d6e51fe161172364a6b
SHA1: 5bd3c4c329b49cb9cb573de819fe3fad1e08838f
SHA256:2ee7fabf217daa6237588d76aafbbe992868b33a1c0fc993580341ff95c0e83a
File Path: C:\Windows\System32\DscCore.dll
MD5: 199004b647d1ac1b1f0a17f04755aafa
SHA1: 6e7851a95f4595afd8f780ffd4123c0575cd7b8a
SHA256:ed4ab2f582db21e7c65ff7f326cb2b1301847e3d1da792f07bb8f686d2480ff1
File Path: C:\Windows\System32\DscCoreConfProv.dll
MD5: 9c5fe37ee542f44a8a8bcc5bda124d5a
SHA1: 934acccd31e7993b9b43d8d25a9e87579ce8c8d1
SHA256:a5f62599d83644e8c5543540decbb04319d5d318b03b4d6dc56124d2b7caee24
File Path: C:\Windows\System32\dsc\DscCoreR.dll
MD5: c4fdc4495cb87a3285b3c260b4fb6a21
SHA1: 7fd9cf78907d9269b4c23dde89706f361b7001de
SHA256:053ba906daee72eddbe4e12cd2e499ec880ef7cbcbe9095de5ee222937ff9797
File Path: C:\Windows\System32\DscTimer.dll
MD5: b3e266e834ef3d32fb358586a3a3bd66
SHA1: bdefa027957d039f6035b80d237dd469a2197ed2
SHA256:c46777082581a67cde57df6d085a0d5c67505af383e4e129ca2f8398e647c748
File Path: C:\Windows\System32\wbem\Dscpspluginwkr.dll
MD5: 4520218e90b53023df1943e5a522e7d4
SHA1: 5309a5b470287c1188ae4ee579f72df141de3ab4
SHA256:d4a5612a82ff97f27f3a3822020790196493125857322ad9d453bf3e03ff6bc8
File Path: C:\Windows\System32\DsmUserTask.exe
MD5: 410c2e8839611762ec62385b8e947657
SHA1: 9cd7ebbdc724a8552b6090e68bb52adb931979e6
SHA256:88352fb0b4550a4a8c24cfc2e23f6db551bb60c41b2fe3db0797a3b7b10e6064
File Path: C:\Windows\System32\Dsui.dll
MD5: 10a321858a6082a54a50e70fabb4acc2
SHA1: d7fdd696a4194ae6ce6239cfc729bb6d7df1dd92
SHA256:5840248afa3ac353c7f47ffc175705d6ebc4c8f9bf2efbe8d4b24a3fbfc50b87
File Path: C:\Windows\System32\DuCsps.dll
MD5: 05f5d00c0912e1c3539c23da8f0ebf04
SHA1: 5ec667ae97bddc8acf85c13a4473faae8e4c6133
SHA256:c19292c2894a38719f332c716435ee2b9be5d73b4e7acfe0d3c3d74b463e1da0
File Path: C:\Windows\System32\DucUpdateAgent.dll
MD5: 893bad1f6a264d933baadea3c2c3e8e8
SHA1: f3089cc689ee0c0a4ab0a399931eae8b94f919e5
SHA256:ef28638315cc8ff4845d69d4f99bed539c8a3a2cfbdda9973dea6119318c96d8
File Path: C:\Windows\System32\DxToolsReportGenerator.dll
MD5: 8d9a5bf8ced24385ea0b7c2efa7d04e8
SHA1: 3d1c83ec8fd9e5ff4131d3f0f6d0786c8dda05d8
SHA256:ce9ac41d4aa296b867714593c7e038fd3627c52464d5c6f2081634b13133ca85
File Path: C:\Windows\System32\DxpTaskSync.dll
MD5: 216aa0cf2b0b8567f7e31fd0e7381005
SHA1: 8da11ce6af2b0fc25435b7a270e049d7692526a2
SHA256:877d0f5d069f40562e2901fdb10e9b11c8d425067227b0a58340fb7e31f21253
File Path: C:\Windows\System32\Dxpserver.exe
MD5: cdda91e9ed4a9032c9d1cde0d95d68ec
SHA1: 808aa273192ca65304573f071f510e9986a532c3
SHA256:cb1ea9331077997d82f9dec11503a0c5feb6d8e146df53625e13c29c7eb4ac9b
File Path: C:\Windows\System32\EAMProgressHandler.dll
MD5: 19a61eb1ad152423184c0585c96cae0f
SHA1: ecfe2bd24765b039836d65af6f9a72decba123e4
SHA256:e4286d15c071548bc414efbb0fd658a75c5aa58659d3f9512157197653c79a53
File Path: C:\Windows\System32\EASPolicyManagerBrokerHost.exe
MD5: 725505cb10ee0d5f4ecf0b20e9b45625
SHA1: 089138d658d94c05a6a1a397a37fa8ba86833174
SHA256:909c209a4cb100e856dab56d8ccf3f79f509786f69120edc5073ea43836b4b55
File Path: C:\Windows\System32\EDPCleanup.exe
MD5: d6a990df5be45528586a67576c38dbd8
SHA1: ecb37467f1cd8b6f58296079da483754517da0f3
SHA256:80dc4096bb1525727316416e5f67caf5b7868de9ac707c02345a43dfbb641ace
File Path: C:\Windows\System32\ELSCore.dll
MD5: c8208f95a033cf94fcafb73aec8890e9
SHA1: 96ae4639032911823e5315fd6925290fdee8ed89
SHA256:a5a60686d18f98bfe118944a36aa0dd0500ab492e1e3ba0901dad2ea2cb36c0d
File Path: C:\Windows\System32\EM.exe
MD5: d859c7487740b747ac3da077ec01bb4f
SHA1: 06ad19962d5c17b7ea3c15d0bdb953b68b65c366
SHA256:8d7c9a50e9a029d4534434a4bc850ec067ab6b988227167e3168315b34f9dcb6
File Path: C:\Windows\System32\ETWCoreUIComponentsResources.dll
MD5: ee9cad75ccea298bc6972977bb0f7d87
SHA1: e932fce3e3d7433ce07aaeface178555b5cef46f
SHA256:e3d78b6b2dff753c979c9b54a1461a4d4542d83410c6a15dc97b3f84c3014fdc
File Path: C:\Windows\System32\ETWESEProviderResources.dll
MD5: 83e2bdca374a52083f29060960807b4c
SHA1: 978d0a9e3e7f97cab7e89c4b6a84aff574c8b7e7
SHA256:9f2cdc047019fee92cc47201d4d82257041b7677a6502490440d0297d10c1ac1
File Path: C:\Windows\System32\Eap3Host.exe
MD5: f41a134fe68e9a86510bf931d4366dd7
SHA1: d8836537f091bdbc3c3f4af3bc8b93efe0463cd5
SHA256:11794657dda144b9a8d07ba5ae0868d2ed7ac47cd7559b68a49a51050e229780
File Path: C:\Windows\System32\EapTeapAuth.dll
MD5: 9186dca792f1ae51639af3d7c5638a72
SHA1: 8c45a72afe14e276843b1868e82659efbdeef5af
SHA256:f509199d23f99a54b83585529684298b6a32005c57fb8546e45d6f04c50004ac
File Path: C:\Windows\System32\EapTeapConfig.dll
MD5: 181c36fb1f2babe9b117e929c029f67d
SHA1: e8d8e8241bb36e7c7f1ae740fa2195b60ba4fab8
SHA256:5af073050ce328668621079894941798566e848024363c50898c8396e2223efa
File Path: C:\Windows\System32\EapTeapExt.dll
MD5: 3b73ab92b7be30d8355aaf9b9f8636cd
SHA1: c39f12e8b965fe51b869e64b1025bb290e19738a
SHA256:146b114c79de8d3ea3db97d214bb4433b227e44b87b03941ff300096794bfb74
File Path: C:\Windows\System32\EasPolicyManagerBrokerPS.dll
MD5: be645b843cf8da5e1839ec0c6e7b5e99
SHA1: 026790d6a7c25af71bb515b57ab4ee868e2ee794
SHA256:712374c5f20ce83bd2c50ef0c77b3dfae74909ccae00e2f8aa917e4ed4bafb24
File Path: C:\Windows\System32\EaseOfAccessDialog.exe
MD5: 8e7e3df91ccde480824451ca624fe17d
SHA1: f8aaaa0b92b0f888af296d5ac1810d1eb886e396
SHA256:542cf8bd9ad63ac72775371a66076a6324166a71bbb5ff309d92bc1cc6d827de
File Path: C:\Windows\System32\EdgeContent.dll
MD5: aff7c99baf3ba4ed5efbcbd3b57ae8cc
SHA1: 3e1d94fe3601dc56ad9dcc55cc5e82567c14cbf8
SHA256:72abcbff43eae82bb2ebba02a0c6ac6173be2e81cb76a1c4d58288f5e286dd9e
File Path: C:\Windows\System32\EdgeManager.dll
MD5: b01a3873d6083c136891a5a49a8d28f6
SHA1: 6b967d5a1c1c1beac1efa616ae7326ca3304eae6
SHA256:1b583fe8e83f82d9ea9059feb2876405e25fbc3ddbf124426032b9c8e81624c8
File Path: C:\Windows\System32\EditBufferTestHook.dll
MD5: 536aecb40b02c998a1f01c39a390f2e9
SHA1: b8747cc30fe0e54d6c2d2039bbcb59705198ad45
SHA256:3b36acbfea1fac76f6d32d03699090ca4b7f9ed41bcd0a042ae390cfc647e957
File Path: C:\Windows\System32\EditionUpgradeHelper.dll
MD5: e650e85376cafe1e9f809019bbf29a4f
SHA1: e94c2264e03d07d25ef796b2bb05ca924f09d180
SHA256:def6df830cf2866fa15ec33b3cafae227b6442dd3ad13b5bf4865dfd23514f21
File Path: C:\Windows\System32\EditionUpgradeManagerObj.dll
MD5: 44922994db53645330c4c7ebddfe2759
SHA1: fc1dd1cce55f6c0518654af99bfe5fb36b2d64c6
SHA256:5210b2046473ff100982c49cebadb3f035cf9d30eff242525d29e8d3a6f858fa
File Path: C:\Windows\System32\EduPrintProv.exe
MD5: 8823a4aee88371c3245f410e7dc1868b
SHA1: 37d3d1f4a9cddc109d7dfe17e10de09049e95341
SHA256:0482a37c3396c2904b391bdfd665e38e87582ff87fcb35da5c71db8e8654fbfb
File Path: C:\Windows\System32\EhStorAPI.dll
MD5: b5fa7135aa1ec0dd31d785b03193554c
SHA1: 346360cefb87ef69ef08255b8be52464535e99cf
SHA256:db9ead835612cd3b26918f5b8949831adbab27416ace86c7ae51df9bcf96d17d
File Path: C:\Windows\System32\EhStorAuthn.exe
MD5: d45618e58303edb4268a6cca5ec99ecc
SHA1: 1f8049fc5ea8b57bb68e19fb55cb9dc1e18e9513
SHA256:d527323643be9df4d174c3169c6f2c7854a59b781654bcaebd154cb51fb4219c
File Path: C:\Windows\System32\drivers\UMDF\EhStorPwdDrv.dll
MD5: 271fdbcf747e8cc90ab30856a4dc8270
SHA1: 8745ddaf89a68bbad0f93382adecf077cc5c9da2
SHA256:586da86bd50099a725e747983af982389a5fb98afc7b3015a016093dafbef26d
File Path: C:\Windows\System32\EhStorPwdMgr.dll
MD5: 4fa3a4a9f8077a1877fbab012ea4054f
SHA1: 675d7f759254d05383f576a624f103684fa0014c
SHA256:a7596d91ebdc71572a6f0922f2f3e2ea35826ea2b255d515c1e491dd459f0a47
File Path: C:\Windows\System32\EhStorShell.dll
MD5: e1bb5c7de84ac1bdbac47af74af05b9a
SHA1: 832e63afbef9c4d9ccac21a96bd300ec4c5c29f2
SHA256:76f58724e8cdae707bb6ff0b764cfd3598581189785ec7aa56e0baf573a80caa
File Path: C:\Windows\System32\EmailApis.dll
MD5: a8563b04978b21a0e5853d11e2f30179
SHA1: 31c9f8e7224f4288cd5043dd53e634efed99b93f
SHA256:9ca439f2389d865788ca7527522e9a46649e1ccf7fc3cde272233786a330854d
File Path: C:\Windows\System32\wbem\EmbeddedLockdownWmi.dll
MD5: 3176f6813ae6051214640c1e1943c021
SHA1: 3bf37f4f0cbb3567b6c010e4d1953f3ce118eb91
SHA256:660dfa28c22ac29063627450a1eede0712f0a1fb11e6efb7ae52e12f3612c5a5
File Path: C:\Windows\System32\EmojiDS.dll
MD5: f260a7d5cb857b48d001f47225ecbbb9
SHA1: bbd65ff9075f5eb8c31409bf1c6c3f58385188f7
SHA256:9efbfc530159d987c2f87892a3c5aa96a6612b0d262953fefa2846ed6d8461f9
File Path: C:\Windows\System32\EnterpriseAPNCsp.dll
MD5: 9adab67c5c300ac4c2b330ba5ddef4f3
SHA1: 9e3505db29a3e04ffcafc86d3074a9a177cd58ab
SHA256:b62d88eb0f9dcbc538270a138b807c54ec52628c65cedb75a36bfdb14011dbe7
File Path: C:\Windows\System32\EnterpriseAppMgmtClient.dll
MD5: ab4a77c28d15c79476fa1f656b45cbda
SHA1: 32ca5473a39d0f638fb5a010a0207b0345f48bec
SHA256:c6226d9526b48b8f31fbc84fbd4866243bdeef1da6833d9d9836c11cb9bd9e34
File Path: C:\Windows\System32\EnterpriseAppMgmtSvc.dll
MD5: 525013542189c9f38c8f4abbb0547045
SHA1: e45a7096ea561e510cb7d3a724c67d927b4ea07e
SHA256:9da71e88b4d9d2f635975ba5f2d6fc329d7787ca89ba2f213ddd467a0a0860d0
File Path: C:\Windows\System32\EnterpriseAppVMgmtCSP.dll
MD5: cdff630dc83d0e474ddade3f37a5ccbc
SHA1: da1e5e9fb699f4747b0182b9370d0579af8e32c1
SHA256:3ef4be5849bb8ed308b27961b6c0df22d6d8cb673cfed9ef6b4098b1117deac5
File Path: C:\Windows\System32\EnterpriseDesktopAppMgmtCSP.dll
MD5: 9b6213c536277d9e33534b3675a94e0f
SHA1: 43ced2f4c0b81b3ec0f2d47efb6ce3e086871ed9
SHA256:72f1285115b086b9cbf6bdb47144e4e59917aa50d3a5bdca56a6650a61fe7ced
File Path: C:\Windows\System32\EnterpriseModernAppMgmtCSP.dll
MD5: 474f6b7e8133ac3c5d61ddb37e18cab7
SHA1: def371270259fb7f5bab77d929a732c6dacdd149
SHA256:c1c5a4084dbd76301ef9228285a3047a316b0a5662c9c3b507fad814f5500878
File Path: C:\Windows\System32\EoAExperiences.exe
MD5: 27bf36b26d5ba47523ce6ecd66fcd6af
SHA1: 6c7b1cffb7f55c7536bb0ca29262c5cc2da7f576
SHA256:012de2e780e7cff7d30f75e4d9b2aee2fd09557c331609ddd54b172f3401e579
File Path: C:\Windows\System32\ErrorDetails.dll
MD5: d2865b08230dbd39797a5c238a8a2d94
SHA1: 850959a12c6f15c84df1dceba2bc61d2a306e763
SHA256:2cd2c96d2037b31fad374208a9c868823ce0470f92fba9b9b8870d6c09df55cd
File Path: C:\Windows\System32\ErrorDetailsCore.dll
MD5: e8d180f4d83c986efdc65cea4a73b9f4
SHA1: 7f7415bac3d21cc32656f4e14f514d549ff1d405
SHA256:4037eb6aa5ab5b341c79309a4254fb4c5b40023802c36abaf804192c299b48ba
File Path: C:\Windows\System32\EsclProtocol.dll
MD5: f8c14b4b219d9f9d43ea7814dc7c7074
SHA1: f60b4832c69cceea0af624a6aa29bfb96b381b53
SHA256:5163bc34d055a62c2865a5fc939574943ba209662754f96da2bbe32ed4ede328
File Path: C:\Windows\System32\EsclScan.dll
MD5: c75c00dfc765587b88df4201b0fc7d43
SHA1: 8db2c356c4a2738b1e64395201e468854e343a13
SHA256:5277af1da54f10ab204b60b701173c4afba6cff0025b95d111ff166082ed1a17
File Path: C:\Windows\System32\EsclWiaDriver.dll
MD5: 08e7a137a06493342eabbefe46bc4e07
SHA1: b658186edfe2f67a3841de13556df5339f6dc8ae
SHA256:220d1da60664b9a266f3c45b5e24b867fb6dd9f7a3d3f0dcc516af45dc78eff9
File Path: C:\Windows\System32\EsdSip.dll
MD5: 573f8f1a14efbb4fb187a6b783cf3057
SHA1: d94cf17a7941da0a61a375dcd6932be0e0bb72e6
SHA256:81546ae66077d6440975a584d4bbc4a83d84360fc4be12f458b213957069b608
File Path: C:\Windows\System32\EthernetMediaManager.dll
MD5: d9d3bfd535cd5855150d96b9f638e19c
SHA1: f111603230996caccbae37f4e10e7cb6c510daa3
SHA256:09a8dfe30215d27afc6a4234fe95e402ebdbe656c2d6f3799b131bde8a12f804
File Path: C:\Windows\System32\EtwRundown.dll
MD5: ff87d34f7d055e8424132a68b1e4f3a2
SHA1: 31195f03c3cca9a9aedb13c1b3a4bcf424d80eff
SHA256:1eb48fa0044186d59a6525d0a7d841d7cff5a7f931393bbcafbb29792c988b41
File Path: C:\Windows\System32\EventAggregation.dll
MD5: 10050dde67bb2556743748f8ec49d453
SHA1: 615bf4ce4a3e95eb6273e3667cb5a2eed5c64bc3
SHA256:d5726a6fd14e328363446dbab08607bba1a4f8f23db4ba48b8e452e78149ea6c
File Path: C:\Windows\System32\wbem\EventTracingManagement.dll
MD5: 30176e157f9107b191fcc87414297ecf
SHA1: 781fb4d8a624fb4a77949f34e127142c44679181
SHA256:bcb2549fe2714833e60caeac180e481f891a0fe04c5106e33c8a48aec816ecd8
File Path: C:\Windows\System32\ExSMime.dll
MD5: daaa25f45a3115ab8e4022d52c462615
SHA1: 9aac37f734eb340439255b891561e5e6563facca
SHA256:388a8af7ae3c3d76ec7a6d6a2a74412a95966d9cc9755251ffa97d885763ab67
File Path: C:\Windows\System32\ExecModelClient.dll
MD5: 04d5145a0d395e483fc7d47a39c643a9
SHA1: 7e2d1c7d2dc140f73134b233443f30dac548514a
SHA256:3bf4ca7238f8d2d1916718be475e05f6d0646f7230adbd61541511908ebcf64b
File Path: C:\Windows\System32\ExplorerFrame.dll
MD5: 26ec8dd38b37889047e64cdfc69b145e
SHA1: 2a8b87f5dcdc63ff231dcfe5ab9157b55102e11e
SHA256:0721cdf19f12adf5a31bda43441609480142221fcd01f73fdfb32a45b5a34545
File Path: C:\Windows\System32\ExtrasXmlParser.dll
MD5: 5a1b3450a600a8b8a49c59c7b3052c6e
SHA1: dd4446f24b80e9f6e1ad95b3eff4660721b87b49
SHA256:e8a1403760a3bf15856e67b1490ce05981e169169b4d0f06e22958c18e3f9cbd
File Path: C:\Windows\System32\F12\F12App.dll
MD5: f60eb151489bc7f11a17eeeadc3f076e
SHA1: 9e9266a3c5e114ad4de63a10a95bb62abdfddced
SHA256:8ea10973bc9794cf04ef9a9de56fa2a8b777af2db3d2106d66768d2e520cb9d8
File Path: C:\Windows\System32\F12\F12AppFrame.dll
MD5: a5a7e15ffb1c546f622a18c48f094362
SHA1: 7da8a2ac358b880caff7f62de93b27944b745a96
SHA256:c65272038076946c3f050650706c22b10a12e629ba92afe50ef97c3c1c48a909
File Path: C:\Windows\System32\F12\F12AppFrame2.dll
MD5: ae2b7be05d4d19a2dcc2fe9ce8db1cfc
SHA1: a4e8b7e53128abd28a187f7e742d1977796d5358
SHA256:04ed7dbf9b549e51c13bdc0fb3b5a04b59fda891883cc220682516ddb1bc1828
File Path: C:\Windows\System32\F12\F12Platform.dll
MD5: 7d637eadfec0a37e903648b8a4073a01
SHA1: 1f8131a96fa5539c706704e0814a570af70bcb04
SHA256:9b6cfb775e4883ad7ea5590e1b78a725a950defaa537ab83783833441cca1948
File Path: C:\Windows\System32\F12\F12Platform2.dll
MD5: fc5142fe55722f5b4fa5015235412a20
SHA1: 64627d595d94c3967f002cc1e9a4572a3d999b7c
SHA256:d5b5ab3007626ee005cf38e30d6d9cfb256f82f1355ca12151c330b58a586ea5
File Path: C:\Windows\System32\F12\F12Script.dll
MD5: 89be90e1cd3553501ffce32e7e62f1ad
SHA1: c8086d0f86df292fa7fa5b83291103077bff6f9b
SHA256:ddb36fc977ab42a1b5252f1035452dea0df6a8b2c33893d93584e2be62ff3680
File Path: C:\Windows\System32\F12\F12Tab.dll
MD5: bf2de24758b5cf4bf126b4d5e59d0934
SHA1: 0fc58cc75f81a5a9f0287b5403f762a4dc660385
SHA256:4947773e760ba6989f725265c5bc0638a8da1352939d14dec63a9781941ea5db
File Path: C:\Windows\System32\FDResPub.dll
MD5: ad64c91b3cc71226785dce688842e5ab
SHA1: 02f9a6cfd6e824529501370b619ed26b34af2eb5
SHA256:056e1091468d268e7970045ab329eb3dff48bb6b22448046a14c309678847b6e
File Path: C:\Windows\System32\DriverStore\FileRepository\fmapo.inf_amd64_f01342b14d6f47b9\FMAPO64.dll
MD5: 0b67fe504407f7e6aff9f3433ffe93df
SHA1: 7552a777665274428f8752b729f3b765843fec02
SHA256:6ed47a940f2ed1b0d7d19b1119d61c613c745b2c4cc8ecc7c63dd620026fe687
File Path: C:\Windows\System32\FMAPO64.dll
MD5: 14e37364525d0d4ed0bb6dfbaf2c3092
SHA1: 5ca96ba7c3c978d736e088b12ac8bdd6619ca27e
SHA256:7226f6373742af3ce0da172292461fa4774fe0fc2eecfead22de770a77ebf8dc
File Path: C:\Windows\System32\DriverStore\FileRepository\fmapo.inf_amd64_f01342b14d6f47b9\FMAPP.exe
MD5: 1823ec09c3b908734ba49be62c873f69
SHA1: 60ef9426a050c0162c51c002b4c390d48fddaa10
SHA256:d0c0b53f74b973afd17e27055f615dad383ff2cf7238bba01a2c3bba59ad585c
File Path: C:\Windows\System32\FMAPP.exe
MD5: 8804c146ab47481878951ab56515124e
SHA1: 616f4a2e1ddf37a7ca46591199a2a3be59b65c43
SHA256:bd07348fc4f5f94253a4fe70c8be4bbd0fb5d3c8a9821fd48e5b1aad80526bc8
File Path: C:\Windows\System32\DriverStore\FileRepository\fmapo.inf_amd64_f01342b14d6f47b9\FMPCHAPO64.dll
MD5: ac819d2695c566b1ccec24b489e5e793
SHA1: 8c4071574f3f81785a2fea1d0f958ede3e69cbcb
SHA256:1dd894faee4ed6de32ae1f48bd72cb1ed465bcb34e7c5eb6171e0a08b8576017
File Path: C:\Windows\System32\FMPCHAPO64.dll
MD5: 9fb5bb701629734e5dc8d2dced56d39d
SHA1: e47b9fe600f96d2637b0563c736f97a1815d78f6
SHA256:9b07774846afd2f82d26da75faf221935aa9b8bb8b6fa276c67e3e2492cac45c
File Path: C:\Windows\System32\DriverStore\FileRepository\fmapo.inf_amd64_f01342b14d6f47b9\FMService64.exe
MD5: 35136509fe15e72cee9854598a038acc
SHA1: 6df277ed48cf89758953b98b041862e9fa08712c
SHA256:31863884d3b70a1a3da5c4abfd1c8fcce82cb760da5719b17599191c13363cda
File Path: C:\Windows\System32\FMService64.exe
MD5: acc307040077781bd448e5a63c5c7a3c
SHA1: 6a58e3d27aa7600f7da9fc528f8c1c36956b0912
SHA256:e324c0d234a8a9e55fc7716be36f5c84b4addcc010747c4e7cee468fc979a50c
File Path: C:\Windows\System32\DriverStore\FileRepository\fmapo.inf_amd64_f01342b14d6f47b9\FM_Speech_PP64.dll
MD5: 3982c0463453fec272fd1026eadadc8f
SHA1: 7c042141e46d5d46b52281a59e019a2a9e557886
SHA256:bce46795992fae3e2fee3e65d2d8e3e205e2269aa5380a6048e4d0e945cbd016
File Path: C:\Windows\System32\FM_Speech_PP64.dll
MD5: 33da8f5cd92b05de70f3d2293e43af0a
SHA1: 961d39612147e31b5ba44bb5637d7ad03aba29d8
SHA256:a9b7692053688b04d3cff5c49512aa17477b49e7b56c88ca8842b88cfde7d3b4
File Path: C:\Windows\System32\FWPUCLNT.DLL
MD5: 766c917c901f8514ca077680b6f3cf13
SHA1: dc01b6eba2659c1da1e0ff3e602f83c6672638f0
SHA256:5bec57d21b67eb65b4b330e348ba82a3b00a4a7273eca59d3f3620d0e92d3b78
File Path: C:\Windows\System32\DriverStore\FileRepository\lms.inf_amd64_a55aa2cd52a3429d\FWUpdateLib_11.dll
MD5: da7a7f59b12148475610c005e61c7bcc
SHA1: f515728b74ca86c8f4191c0a9f4c517604ba99dc
SHA256:dda4e8b67b8ac232d22fdd30e91e52e76b9e2afc954c25260984f0f7b32d4624
File Path: C:\Windows\System32\DriverStore\FileRepository\lms.inf_amd64_fddb643595e0b8d0\FWUpdateLib_11.dll
MD5: abbb27cca28832acb861391ba95baa83
SHA1: cbb963afacb87f55e760439e7df6e45eee44188a
SHA256:b035e76adc3ac58af2baa3d9cca3b252a5966b26d23b983f9a856a7b4122ff22
File Path: C:\Windows\System32\DriverStore\FileRepository\lms.inf_amd64_a55aa2cd52a3429d\FWUpdateLib_12.dll
MD5: 2eb5e21fe3edce713216e0c04996fc3d
SHA1: 0b4e3532f1ee48f4834a27ca9288875127ea6f15
SHA256:ac589e4b05b77398a914ca0059d104046346d21d881425d8687355a284602c30
File Path: C:\Windows\System32\DriverStore\FileRepository\lms.inf_amd64_fddb643595e0b8d0\FWUpdateLib_12.dll
MD5: 6474a0c5cf0c24288430128f6da71d9a
SHA1: b1f69df4868745926c36288e9a751aa3b4312a7a
SHA256:239cf86b7778a1c8b48cf496f2a1700796d73e4bdba91a4deca7232667069dfb
File Path: C:\Windows\System32\DriverStore\FileRepository\lms.inf_amd64_a55aa2cd52a3429d\FWUpdateLib_18.dll
MD5: c199c6dc4e7d995df2057c13062e3501
SHA1: 8b812479ed542ca6eb192d8f44d8e164ae97ee0b
SHA256:cd8375ae0da650c6441fab79a6774d9553d98694e09b9195cf42adee724066ae
File Path: C:\Windows\System32\FXSAPI.dll
MD5: 9f4a5cce15efd93ffb494cdfc45a2c08
SHA1: 8bb864faa4974960caf27d7242219576a35756d4
SHA256:c91563ad21b793a5612ea4040d3a42fac61f688612f750bd0169ab66eb0adcd0
File Path: C:\Windows\System32\FXSCOM.dll
MD5: a5ad82fb38e9dd5e1705fa38dbc8ce37
SHA1: c4d877a1680fd8a32e31f219bd18b6a04824ccfc
SHA256:bff4d6c96fd77bb7f15777e0b8d64cfaf136750eb5cc05149f537e598a8f248b
File Path: C:\Windows\System32\FXSCOMEX.dll
MD5: e33c1ce36fe440b0e3f8bb00c153e876
SHA1: 204d74876665abf2805bc7c89ccc5dea7ce546fe
SHA256:ab362623a2bc6dee68d5a7a322b0387a0fd05fa3dec1be7e5909a87937abf2f7
File Path: C:\Windows\System32\FXSCOMPOSE.dll
MD5: c55fcdd97ad9df1e770b1c3e4a623fa2
SHA1: 470da61447e4b8fd018c027e2548c8932f236ba2
SHA256:e014ca40cd32b51e701bc21177ef8356782fb21c6879f6ac8efb58ff864f2b0f
File Path: C:\Windows\System32\FXSCOMPOSERES.dll
MD5: a55fd86e538d00af3ca79875483534c3
SHA1: 54d4730f9c0a73d855ab99154acf532b3e61c735
SHA256:75419062bd8cddef5143b6e811d78bb1564c62b7b175b04fb0cb24f5f08394d6
File Path: C:\Windows\System32\FXSCOVER.exe
MD5: 6376c7f775264acfc575e4b6c8dab8a5
SHA1: fe8c108a0834888902990670acc9850a4b87664d
SHA256:bdd8eadb069df97651859ce57d4204f097297139807d263ae9328f5dd4f8eb68
File Path: C:\Windows\System32\DriverStore\FileRepository\prnms002.inf_amd64_a51e172297d3fe22\Amd64\FXSDRV.DLL
MD5: c504c619a9465ca8d065016a69e083d3
SHA1: ac421fc1bca462acb2f70278b4fd507cd39eca00
SHA256:4f453a1b2a49b67da82276c9d437bbc32f24f5760a238f55289c2211f9e5c0bd
File Path: C:\Windows\System32\FXSEVENT.dll
MD5: 9c2f04a130c1e93ba93d131cbbb9204b
SHA1: 52fb7b76cf741d9368b3924ff917f7da4f24777f
SHA256:a7bb09a9716bcf59a848f9ccb4f4b171eff9ef782abad297bf4e0aa13a15d403
File Path: C:\Windows\System32\FXSMON.dll
MD5: e1ffd3dcfcf3355def539f81418c5c6b
SHA1: adb168dfe2cb63deb576bf2cb64987c75686557b
SHA256:1158e413bbb6dcc6324eee784c1bfba24d8ab070a5378ca84100cea2a656ff09
File Path: C:\Windows\System32\setup\FXSOCM.dll
MD5: c0e3831d4f9a8342ed72c0e9237c1ffa
SHA1: 19f993714ae9077735551f3ea52e2ebe4b61fd94
SHA256:0b4c139182ba9bf4cb7db9594f1db9c5bebf8fe3eff5acca338db9696da2eea3
File Path: C:\Windows\System32\DriverStore\FileRepository\prnms002.inf_amd64_a51e172297d3fe22\Amd64\FXSRES.DLL
MD5: 7cd6c31bd212b8fd75f0fb40038157fd
SHA1: f91b8bf7bea85730055a9df7c53e7f4646f7facb
SHA256:a4dedb2a2f6b5fb4b32fe95a96b6a17e6c9f2ebc5d5e47bb00a25ee8719ccc52
File Path: C:\Windows\System32\FXSRESM.dll
MD5: 2eec61c25942c27ad8b6520b914dd70b
SHA1: b39174101f408cb2ee736d9042b2fdeacd2fece4
SHA256:6b0b5288dd1bbebbe97c23feb1e938fb6d4b9a61c9218749280898318c1edc0b
File Path: C:\Windows\System32\FXSROUTE.dll
MD5: 9e874c0efa310674c567b933f8b069e4
SHA1: ed70cd9fbda5d265e89e921346f7ba978529b080
SHA256:86cfc41867eaf7afac8127c025e8aca5ece1e729ade339c4c504efa991bdd3bb
File Path: C:\Windows\System32\FXSST.dll
MD5: 3b6fd548892a902778ace14452100ffe
SHA1: 5ba5dea121f70e8fbda42ae12b35ea7aa528c5a6
SHA256:50340f120f1cd741f601442932defef92bc481760771e306406a847abc8d01e7
File Path: C:\Windows\System32\FXSSVC.exe
MD5: 18567f2b31b6ca325deb142be6025543
SHA1: 8f61f32b2103c872ba98001c0d08257429803868
SHA256:90388b4072bf0c3046249776732f10b8380ea850fcf207c3c1ac8a228909ab44
File Path: C:\Windows\System32\FXST30.dll
MD5: 4b48775d8aee017eec814021dd545bd3
SHA1: 7184cf98fdec98e86d716df2033bc907bb585843
SHA256:17c947b37b109d680209f2def54c94ccb0b00c85eefde7f507e648c0665d6b7d
File Path: C:\Windows\System32\FXSTIFF.dll
MD5: c237940b1c61a807fb22206574b92225
SHA1: 949a129783bada0ba95920798af5f4fd3ad708d4
SHA256:388f0d18509fac1588317022a73de563a9d53dd7073f924f4f008c7af6cdaeb5
File Path: C:\Windows\System32\DriverStore\FileRepository\prnms002.inf_amd64_a51e172297d3fe22\Amd64\FXSUI.DLL
MD5: 35950eba8e876c5792f444f2cb95a7ba
SHA1: a2843dcf260cfcfd0bceb122d40f2200ee75dec5
SHA256:eb2d5868d1138ff2515fb3578ab603bcb0a7d2d8f9f74a03ef9970ad092c3166
File Path: C:\Windows\System32\FXSUNATD.exe
MD5: 8133523a0cdfc78bc08439bb9fb9d879
SHA1: 8e55728db0f7f96775b8d123484fc127704b9c43
SHA256:08c2389d5bfa75a597cc4fcb59104a1e179588ea51c62daaaeda4dddfa214777
File Path: C:\Windows\System32\FXSUTILITY.dll
MD5: f56ed25c0dfd292c11d67315601cec26
SHA1: d1c94bf8b547d985ef108f939ad0387639f80a03
SHA256:d6022ebdcab82e02f34ec3a9d9d24d82aefc507008ebdefe9952b26cb680d8b1
File Path: C:\Windows\System32\DriverStore\FileRepository\prnms002.inf_amd64_a51e172297d3fe22\Amd64\FXSWZRD.DLL
MD5: 2e0e20c2a9eadb36e3414660bbd303a7
SHA1: acd8eae2b6c517b244e8343410b23df4d59786b0
SHA256:c1b7136a6d530454095447ecf8e680c053ff06912155d237d1d33ba835adb803
File Path: C:\Windows\System32\WinBioPlugIns\FaceBootstrapAdapter.dll
MD5: 86b22a90ef813a66c9b215411ad1d02f
SHA1: 37f0845f2dd8c2476c37e24911191f21a94b0022
SHA256:bd39aab9c44842da94fc9b3b3718bbaa5b678c45327d104f7098c84e68ba9210
File Path: C:\Windows\System32\WinBioPlugIns\FaceDriver\amd64\FaceDetectorResources.dll
MD5: 31445a33e1badb4f9b1669c44b3e4311
SHA1: 9472dee3dc64ded38013aad0ea1cbb8c10d08d7c
SHA256:9f52aed958e712da511e5ee33df42c5dffa96e9cf187ed03481b161daff5ec95
File Path: C:\Windows\System32\WinBioPlugIns\FaceFodUninstaller.exe
MD5: 1cf63ba6d0b57d7bd0105287a359b467
SHA1: e15e59d4c32eefc1e131f6cc0b19744f6baf8b59
SHA256:cd06cf633d5dae8bc892108fc589cb0d13b65df3c30b4bcdd4f557413a8cfcc5
File Path: C:\Windows\System32\WinBioPlugIns\FaceDriver\amd64\FaceProcessor.dll
MD5: 48104e1e869dc17c18841d7b62522d7e
SHA1: 310b472b6cdadeeaa1d2b6808924f4824c000432
SHA256:26e488760f4cc5877b889047256813b795706aeaeb507cf6b77048a5d0d25297
File Path: C:\Windows\System32\WinBioPlugIns\FaceDriver\amd64\FaceProcessorCore.dll
MD5: d66670c622e0d33cffa1729d84505c49
SHA1: 1364b01c9d71c505339b897a3a368966412ebaca
SHA256:56d8f2fd24194a73851452f66c568269af2279e98093d54ac07cdc32c93d4f02
File Path: C:\Windows\System32\WinBioPlugIns\FaceDriver\amd64\FaceRecognitionEngineAdapter.dll
MD5: b5924fea282ee18a67ededea627a0c21
SHA1: da59bf66e77c50b01840e64ee5c572d080a8e96d
SHA256:5156bc37bc96cc2ab8effbcfcbefaec6c8254264e44b8b742069455ca8c6c2b9
File Path: C:\Windows\System32\WinBioPlugIns\FaceDriver\amd64\FaceRecognitionEngineAdapterResourcesCore.dll
MD5: 69afa390e3968584489010dc5c2b28d2
SHA1: 59ca58bf4703ccc09924acd9e7653ca9710d8b9b
SHA256:0e13dc4764af9a680c821750a500a6e196f13a2125722bba9b516113b40ce0dc
File Path: C:\Windows\System32\WinBioPlugIns\FaceDriver\amd64\FaceRecognitionEngineAdapterResourcesSecure.dll
MD5: 5d3b5bd9df68900bc986c44937a7ef2e
SHA1: 75bd51548b2a1fa18e6f78c1d24c7b1a9775a324
SHA256:979537eda8e259862395fd44c3efaee9267de50ffe97d1822165b12405c5f6b2
File Path: C:\Windows\System32\WinBioPlugIns\FaceDriver\amd64\FaceRecognitionEngineAdapterResources_v4.dll
MD5: 45dbc07c3c99bc0aa59f6c3dc7f2a93e
SHA1: 28ec4c24ecd192de22b5fa2271e93103d63d74e3
SHA256:a28baa7c633439f969a817e579968be3a1d58a728ccbe3322de67217b2e82f4f
File Path: C:\Windows\System32\WinBioPlugIns\FaceDriver\amd64\FaceRecognitionSensorAdapter.dll
MD5: 873ae9329924ee6cebe3529613bb67af
SHA1: ca2d111b595dbcfae38b76f7fbcd15ce5892e5d0
SHA256:681044ca418e9a16dcf69156e7b95e6ef063703eb51bdcf086d1c31aec4e2210
File Path: C:\Windows\System32\WinBioPlugIns\FaceDriver\amd64\FaceRecognitionSensorAdapterResources.dll
MD5: 5ab95a6d385521ab69496d2ecf2a1458
SHA1: 9d8b9657d40b15a4afcb8948382fbf2f581df572
SHA256:498d0c2170a0fe508297d61b713f39875ac20370719c31962d2e1393c157558b
File Path: C:\Windows\System32\WinBioPlugIns\FaceDriver\amd64\FaceRecognitionSensorAdapterVsm.dll
MD5: 1b4be0d4b4ffdedb9e0251fb571fa3e1
SHA1: 793fac9c191ff618f835f6dbc83fefacebe6f0fd
SHA256:4c9d647394c161ac24dae3f9d7ddde87b4798773272b332b5c87dd19308a77f6
File Path: C:\Windows\System32\WinBioPlugIns\FaceDriver\amd64\FaceRecognitionSensorAdapterVsmSecure.dll
MD5: 0a2cf3790b262be98370679f5cc7cbf3
SHA1: b4c99e05c4d2163097d249af1c3ab0fc414c03ec
SHA256:1848e30c7f136738c705461d7464729ffdfe1e163a8b10c3dbf05e9e00d8749b
File Path: C:\Windows\System32\WinBioPlugIns\FaceDriver\amd64\FaceTrackerInternal.dll
MD5: 1700ced36f11db9031027258da4d9dc1
SHA1: ef722e4272dacf9180766ef954278e79ce6418a8
SHA256:be4c5d4d92d8e9fa7af4f0d8a21d5d0d9cbfbeab5abcf35fad5290994a15e4f4
File Path: C:\Windows\System32\Facilitator.dll
MD5: cca94552f0db09f361c9b930339f4b5f
SHA1: 7154f33c7e25d2745f42d0a7d60da2a37b4f4e7c
SHA256:56e0878242f7da3219f27d8702882864128d23af5c521ffe121ee50cad18ee91
File Path: C:\Windows\System32\Family.Authentication.dll
MD5: 90cd14d6c8edb785cf9d0b9d843f01c6
SHA1: 15611bc4276dec4d42da95daede989407e45db59
SHA256:927c7fa6118663e1cc121ab288268d468c00614323a12a2d440f35a19394a907
File Path: C:\Windows\System32\Family.Cache.dll
MD5: e66bf0e85abe66dcd5d84cf368c62cca
SHA1: a48322f98a19993233eb166358b4e08e8fb13173
SHA256:f57be29c1615ab4651514f330b6c67f25f10da28ddeff4dce41ff62fee43950f
File Path: C:\Windows\System32\Family.Client.dll
MD5: 6ece9ecea2a5ff5111dcf04d9c177f44
SHA1: 03f21039fe9181c8ee3f48f9195d5f874ae045fe
SHA256:761d3af5f96a40d002e40ef657c0351d7448e002256fab0483580895cfca838e
File Path: C:\Windows\System32\Family.SyncEngine.dll
MD5: fb056558c27bcecd01562e0007fd475e
SHA1: 5f08a350f1eb3b9667c67cada9ce8e17d1e2661b
SHA256:588b27c84132b3fe04427536729529b621e5b2c4033df33e700c4a9207f6b0f0
File Path: C:\Windows\System32\FamilySafetyExt.dll
MD5: 8e6f4f474d3fd0c2aec116e72e4d8f3b
SHA1: 022e40990a4a34ca04f56254f7cbc531d4a082c6
SHA256:5c1d974a500f4fd0d8065dc36991a24af11b38a152d711cb2122d200c7612221
File Path: C:\Windows\System32\Faultrep.dll
MD5: 63468ee715a16966593e834e2d820f74
SHA1: 4251e43fe7570fc4af227a65e764dfbcf5a888c8
SHA256:18cba70996351f4b79a10deeaa6cc2b25212e8d119363af403ce4b864cd5fc74
File Path: C:\Windows\System32\FaxPrinterInstaller.dll
MD5: 8180902298c6c69fde0350c6d5aabe14
SHA1: 6570a18e23072925f0102554ae6aea882c360071
SHA256:b10e8447faee32cdaca0b7666ce143fc2840b2d4c520d58daf413b824928d1b6
File Path: C:\Windows\System32\FdDevQuery.dll
MD5: 7395aedb87693ac72537d1f1473b6147
SHA1: ca0e3b4452b153e30541bd52cafc7ed503a19715
SHA256:ada3e330c5b1e85d534d870c3fd8393e3523ecfabc26d1e6334eea579d3bdf2b
File Path: C:\Windows\System32\Dism\FfuProvider.dll
MD5: decc69e4679d90340f8bac3d26a9fe65
SHA1: a1fdba3a77b0e24c8bd84220a77e0e614beb390e
SHA256:886b54115179ffb618f881444574f6d40bbf73fd1b1ede89dd6d65761fa718d5
File Path: C:\Windows\System32\FileAppxStreamingDataSource.dll
MD5: 998d5a205cdf666ff9a50feaf3802b17
SHA1: acc73c9b2188e125f3c256f054757fc60c74dd72
SHA256:b98a1eee5d46e6662a188e4c46768934fc46df313a703e9e7caa3ee161b2a237
Description:
File History
File Path: C:\Windows\System32\FileHistory.exe
MD5: 9da1bb235c62e5016d4d3c162da1eb37
SHA1: 77ce3e3c7ed2e9c4f54124b0614e35baa438575e
SHA256:8e1a559d45472b4a4cdd459485104a16bd4c38f8ead46c0231c70a19c49f5a2d
File Path: C:\Windows\System32\FilterDS.dll
MD5: f98175350fa61f9454ca3edbc94660b2
SHA1: 1ce924f135c9e84126f077552442f86862546d9e
SHA256:51d16c145fa133eacda2870d8da4612a80aabf8cb522fa6a34dc01b27361ae8d
File Path: C:\Windows\System32\FirewallAPI.dll
MD5: 5c530b99f28bfe4c6550ee057b6cb00d
SHA1: 6709db5295f7420e543be5934691dfa3028583a1
SHA256:f6ca6fa4d6a28ae54d65decce4d565c346d7b5ca0270496ce8bfcc89d000e65b
File Path: C:\Windows\System32\FirewallControlPanel.dll
MD5: 2056bd544acc019da59ba0d907780729
SHA1: 2ed324327cfb29de485b6c598c360bb9204cdadf
SHA256:0f56d44a48121b98fe208f8805f8e314214b7183cbbc3a933b38325c4cde9d48
File Path: C:\Windows\System32\oobe\FirstLogonAnim.exe
MD5: ea059e3ba7e07347bde08ef016e09d50
SHA1: b8fd1e038ba40053c35759c901e304f79e00d367
SHA256:96ec7820603a983285a982ff7d26a688c7de3184fdd73041655044162b9a35c4
File Path: C:\Windows\System32\FlightSettings.dll
MD5: 7c36e463e99da7271e086ba9864c5c88
SHA1: d53e83f998867c0ffb79399e32db9313ad20ed2c
SHA256:398e79d3678f7facbecfaa1515bcd4f543c2ae81f471fc0877931b7f57ee9289
File Path: C:\Windows\System32\FluencyDS.dll
MD5: 9f87566f7eee2d4476940bae58895d15
SHA1: 74abed5cd9d2b825e4e8e54d093dfad52893bada
SHA256:6ea087a1132b667a43fcc31b24c09c1b1259aca2cffc2dc5639044e90f6d1111
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\FnHotkeyCapsLKNumLK.exe
MD5: 3b834bd873e013eae2d13fe607386f49
SHA1: b3b047c3d6d786c04cd9a490d938da8049c8c45d
SHA256:cd01c1a1950c2baeef107a8f0ee8b1fda234312c5cb5274079593b81bc8d0c56
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_fdde6ecd49c3a98b\FnHotkeyCapsLKNumLK.exe
MD5: b43eb19a3f8c91c877e37806b29b0014
SHA1: 62ab17e1ce944f110aa66a2b518271ab5313becd
SHA256:c02a3675e02d3b5dbc3859666c93b1f353837f97de734b611fb54ab48e711f99
Description:
This utility controls special keyboard functions like hotkeys and function keys, on your Lenovo notebook.
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_01d078da8c0f4900\FnHotkeyUtility.exe
MD5: 0a77062d9d84ac3e2f604557495053bb
SHA1: 92b2933e766c39b0b8e80427d997903b9ddc3e41
SHA256:6006891d03dc22905aa7452ce6264fa0c058a49dc01410b3f965540d9dc0712a
Description:
This utility controls special keyboard functions like hotkeys and function keys, on your Lenovo notebook.
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\FnHotkeyUtility.exe
MD5: 603ee69d25fe03ca99e293c88a086c51
SHA1: c33a5e48fb03674a3a71dc037fa3e22d0efafb17
SHA256:cd08bba736e4d825f6ada75643af98e091ddada071c99a6031391780f33b95d8
Description:
This utility controls special keyboard functions like hotkeys and function keys, on your Lenovo notebook.
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_fdde6ecd49c3a98b\FnHotkeyUtility.exe
MD5: d8d85f0f763d227a3c20ebed00d6bf7b
SHA1: d2cf71a88ef81073139d21d70bb47f77b73b0ce5
SHA256:62f28b70df8aa0d67a66e3cd59fbd883301c2e03f4f6dcdaff3878709ca321ac
File Path: C:\Windows\System32\FntCache.dll
MD5: ff4c5835c2d0f9a4e2762ee7d86c0d30
SHA1: 5f59678109ebb7f946829f15a02a16f1b4b0b16a
SHA256:0d64fc009d533fde14f13cba35ec5425b04c4231b3041a0a26926125b828f094
File Path: C:\Windows\System32\Dism\FolderProvider.dll
MD5: 589d4527d1b070fdb635db7981ae5fc5
SHA1: 85133ca84bf43e7b3aa0054af66991c30ce68d3e
SHA256:011c5753d336a1898913f9ca2a5458eba88a93cb8c719a3cb222cad58ced15a0
File Path: C:\Windows\System32\Fondue.exe
MD5: 57f7b3addd04d417a764cb334ebf082b
SHA1: df3ed39ea46fa983265d0bf15ac41ed3bc1fd046
SHA256:606b3971e1eb658a3306efe822ca82032d92afced7aa0477e8461dd6221da792
File Path: C:\Windows\System32\FontGlyphAnimator.dll
MD5: 2a54cbbad506f599ea3daff233c5d112
SHA1: dfc30c256cb224f294265a7b084fd9370089af1e
SHA256:7bee27f8db56e9fbdcafa0c0c80a0a151c6f749c6f3bb02d3b22d85061ef4e1a
File Path: C:\Windows\System32\FontProvider.dll
MD5: 0e0854fa796c638ae44e5027fdb47e74
SHA1: 8bae94582e316a9621a6413db34579fe9200f0a1
SHA256:8bf811040ba0d17765c176e5fd23a172e604e8dbf1bb96e3bacb0ef9ecf991e6
File Path: C:\Windows\System32\FrameServer.dll
MD5: 188a05e644295fd1a43265ac887890a2
SHA1: ff945d26a51a7f7df8ca29ce6650c26348a89af2
SHA256:552cf368b6498f8666673a3aedfb3de35424ea25158f1de451d137048b269abb
File Path: C:\Windows\System32\FrameServerClient.dll
MD5: bfd06511fff5ef1cfaf08bc9a7b3cc92
SHA1: 809d6bc6edfffe86a89a8adbfe09d0f5ef1b9dcb
SHA256:a47ec32c1c9cd9f1d016782ab4dbdec48830a3768621fd48ab43bf55102b3ace
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvCamera\FreqTransfer32.exe
MD5: 8569a163430471f01445d8113faa0517
SHA1: f52100ffdb780a1769de043fc9f31cbf772c3d9e
SHA256:06e8346063623a983908d16e70887cd307ea8659121ad10a91f32c2d99b483da
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvCamera\FreqTransfer64.exe
MD5: 1519ab38e8b7b33715d3a957f12bbba0
SHA1: ca93b3a122400257ce4de591acd52937011a0f42
SHA256:a0a680918c84e5424ef8189533ad68ea6cce01d3f05606375cdb48f6dd719ab3
File Path: C:\Windows\System32\FsIso.exe
MD5: 58b48c4e6c32f1242e27bb72f355d4a8
SHA1: 561b2c296d00cc2e50784228ee4a1b93ea28fd9a
SHA256:6ea15948dc1535f20df1ad9444533b2fd508db4d6d5449109894337d9a20d73e
File Path: C:\Windows\System32\FsNVSDeviceSource.dll
MD5: d1864863f1d3c0635e20b8e9e9baaabd
SHA1: 8a0aa8c16f65b18f1bf7dbfdb264c8c174dcd8be
SHA256:5870babed2677b462960bd6df8184a4d105c7f642225605ac68feb8c6b1c840a
File Path: C:\Windows\System32\DriverStore\FileRepository\fusionv2.inf_amd64_a47d9636ce0d7dab\FusionV2.dll
MD5: a3e8ea6757322b4aeaf6b1d0c96f103a
SHA1: 158e5a3b91479e973862250a501b3cbc55ea19bc
SHA256:00accb2f3d21e974a522fdcc3ee5a57ec897bc8955256a79efaecc3709d9e6bb
File Path: C:\Windows\System32\FwRemoteSvr.dll
MD5: 25fbfaef522211f9d44fe0f9fcb51c65
SHA1: dbea5e52134a002bf2bcfdcf56389bf41e41b006
SHA256:a5dc36f535251d03722f1ae94131e961e81033a895bdb305bbee4c24ebaa9add
File Path: C:\Windows\System32\GPCSEWrapperCsp.dll
MD5: 5527cebbd0ffeda20bfea330dcb86f0b
SHA1: 14be084124df73a6b692c18fd6c338e6727c9c1e
SHA256:14fd8cd32d377601c61f6dca1d1879f9381f043ddc1f46941d1218245f7dbc98
File Path: C:\Windows\System32\GameBarPresenceWriter.exe
MD5: 622dd06499c504ff3faaa8e0eaf9b2e2
SHA1: cbfb9b6639fe664a34af4fecc6426585685b71a6
SHA256:d859798ca9e31527b995cc446ca9a3c73963bf8e43afc24661e079e000c1933d
File Path: C:\Windows\System32\GameBarPresenceWriter.proxy.dll
MD5: fa24f7d23685a80796e175d689c4efdc
SHA1: a52293dfe1ee3a6d52bfb9d963c8cf08adb3df09
SHA256:7b3c2027cdc8bff840227f5627bbb7aa29d9d5b29a48c11a016d7401ec82d630
File Path: C:\Windows\System32\GameChatOverlayExt.dll
MD5: 635100d02e87b5738573f39f7b30f75d
SHA1: 27d0e2eb19426e7a635895579d286616c0b1afd7
SHA256:8fab984a1f598dc465973b763da9bd9cd495788e0fd39025feb4a75f4036d6db
File Path: C:\Windows\System32\GameChatTranscription.dll
MD5: d648d2d2b1b83888355a897ca207b97b
SHA1: 934d511a36db36cbb94ff909d7200638c3850bc7
SHA256:a7274d8f23f2cb2ab8fb5573fb1f279987de4ad8ca10ca8fd0e2b71f8d2280d0
File Path: C:\Windows\System32\GameInput.dll
MD5: 64af92de4c49e6fee6116b3544d883ee
SHA1: 63adde26afb95196dbc91b69df13e9bff2b2ddf6
SHA256:64340b83b1ee3ccd50e242079e1c029fa29efff6cc6a1a32e3464f6b12651c02
File Path: C:\Windows\System32\GameInputInbox.dll
MD5: 37543f31d3c62862ac466a68fe525e27
SHA1: c675f5982c06e84dadee7f6bc8cf421a0d028d57
SHA256:be1b5f067773719c8a35efc849813e74781ed155007bce67976614754459a85a
File Path: C:\Windows\System32\GameInputSvc.exe
MD5: eb0ee366e70fe54e43f4ee711190b241
SHA1: 77e5760dbc49a436f9790b514fc06b911dd3cd8a
SHA256:a2950c1bfdc580200ac15b34157837b8e1a9829f508f2cf41944fdda631a56fa
File Path: C:\Windows\System32\GamePanel.exe
MD5: 146dd91be2d0cba836d403b08141c092
SHA1: 63cb7ecf6b7238ad5a4846783b19a6a76bd1b0bb
SHA256:ea16b3bd3c09eaf5dba530ce35dac103f0aa9e016b319a75f8375e8318bc2ba5
File Path: C:\Windows\System32\GamePanelExternalHook.dll
MD5: 2f995c0d7cb8035358a6496f0f8fd3a9
SHA1: c22de71da3cf96c08fd087c34737010712115747
SHA256:0a45756ec0416cffaa70a99cf8fbcf5bdc70111ac6027708da58f6183e78d080
File Path: C:\Windows\System32\GdiPlus.dll
MD5: e527bfa22a88c8f3b1c379222569c342
SHA1: 7755a141fc855c9a44907c6d29e0c5dbbbfa9576
SHA256:dce225179cfa7fb2417f70db31d937e0474c1728f7957c3afb1f2990d18d7110
File Path: C:\Windows\System32\GenValObj.exe
MD5: 263cfd0c4ae43e8b6e96fea750e4b4ac
SHA1: 6e7c6f7028a8fd726f45b2a731b938b6a156290a
SHA256:d5cb78a4a0adc0897de7c8a292196d85ba435f89d0123cc64ad15841c0a9d802
File Path: C:\Windows\System32\Dism\GenericProvider.dll
MD5: 972025e2a66cb9a86173223c70ef5421
SHA1: aea2430707dd822904b5762d3e3d9dcc4ca0bab0
SHA256:ba683e9cf490d59aa1092e9f29196d6b48702ce8913d19f167870907ff50c424
File Path: C:\Windows\System32\Geocommon.dll
MD5: b9817f800bc16c7f6dcdd9c1b5896923
SHA1: d0d6981543c81ee5b9dd21d7d08f4e18e043de27
SHA256:4259db32762a26456bac42d4e7d2b1744c5d54dd04d47ac60760c960c6f7dc09
File Path: C:\Windows\System32\Geolocation.dll
MD5: a960251f061c9919b828838d8105fcab
SHA1: 138e2954505d77597886ce1e3639bd8641a572df
SHA256:b9ea8e0541e15bb43bd1377db3a92810f6945ff35b71c17f73b6253d95fec744
Description:
Intel(R) Graphics Control Panel
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_0d8dab4470c5524b\GfxDownloadWrapper.exe
MD5: 2bb521ee121e02b6978c61b04e2b7952
SHA1: 5d5f29ea3379ef3e7c6352e05062c7e82c8b34f3
SHA256:24c04a6e642dc33795c5b2de15d6107e1360e89a51799aca39d0de401199a1c8
Description:
Intel(R) Graphics Control Panel
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_7208949846a9b9dc\GfxDownloadWrapper.exe
MD5: 66d9dff58ce8f6c7155cf115cdd9e0ff
SHA1: 91f3412aa33102d7a70003afe27c090bfa57dcff
SHA256:88e842339c0d8ace98a6384e1df6a3d68b352c5709ae23ae332db043afcb0336
Description:
Intel(R) Graphics Control Panel
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_d2a0453c62b3b51a\GfxDownloadWrapper.exe
MD5: b6c88a8dd7377030a688b8ad8e3c0238
SHA1: 6e455157b1510e48778027813e2768f660ba2dac
SHA256:874062b3774e4f9c527eee527f2c19d8e9b254e5b7c681fef64d2107ad7ccc04
File Path: C:\Windows\System32\GraphicsCapture.dll
MD5: 8471587feeb515a11f71f445b7ecc567
SHA1: 37c61f186e09d2189c18f8cd4499fc0514c90cc9
SHA256:36b13b49b31a64060d998cf6ba6aed19b66be073a3b10fc83089952b5e0f11ad
File Path: C:\Windows\System32\GraphicsPerfSvc.dll
MD5: 1bf4e3e6a497278c882b2fce4595eb6f
SHA1: 7c9dd2f3d9541bafcc80400e63dd295aa31a2418
SHA256:382ceba18adc2843a972c749a0be8d6c63cdc09f58c9dceb23920d318412c5a8
File Path: C:\Windows\System32\Groupinghc.dll
MD5: 9b473b5c93e7abf2b8dd7c669284b183
SHA1: c16f87e698ad082d8ea10c1894c5b0b8d2b75e7d
SHA256:8311473d5e92dc64ec8b19c3719cf742e282648facda6651dcc0cc282b86f6d9
File Path: C:\Windows\System32\HNetCfgClient.dll
MD5: 354cf460f238dcd09ecfbc6ca3d107ac
SHA1: 7938969fba3f0cd5e47ca6c1002053b71a9e343d
SHA256:275b3bd71a918582169d3738ccf0816150c4e33e2bb492eb53d3157f769c2499
File Path: C:\Windows\System32\HOSTNAME.EXE
MD5: 33afaa43b84bdeab12e02f9dbd2b2ee0
SHA1: a57959cb3d0cea955acaa5dba3d1197cd4c7e1a8
SHA256:a90c3fb350a11c6f6a6efa9607987d924d1de65e09ca9faf2e0e0e00531ee335
File Path: C:\Windows\System32\HalExtIntcLpioDMA.dll
MD5: 14cf6bf532b9ea9eb756fa3ac1b48047
SHA1: ea202ce337eb25677fd78239ba007ef62299ade5
SHA256:3da7cf0676adf77a65d46964ef738400c549963364208d6d2ece1bb120b1f357
File Path: C:\Windows\System32\HalExtPL080.dll
MD5: 6d196f378b3fb8fc5cc19c7b6f12e170
SHA1: 177e19a057b069b4c12ba10db89d5df219335bed
SHA256:f9628bbb86714c0784d50f129aaf69e1eef357158c456b12ae7d77c2eece41f8
File Path: C:\Windows\System32\HashtagDS.dll
MD5: 079e7179df5e95637b4f4bebe0080514
SHA1: 4a676a5dfb80d80721c49719a345f53c569d6a6c
SHA256:b97d4bf13e4fb9212bbd1b4329259b7f0a280e83046a27ef5072964940ca991b
File Path: C:\Windows\System32\HdcpHandler.dll
MD5: cb2588293955f427b49c28fc9df2e30c
SHA1: 20e1f637f106623bf11f3eaa22a459884341ff99
SHA256:c963a00bdfcb540defec93376a4993412f280dfb27be451e259ab42e6ccf3d8a
File Path: C:\Windows\System32\HeatCore.dll
MD5: f0343c920285cf053102903f5e3f4802
SHA1: e727182e27daff547ba549ec8cea6896b264bfa9
SHA256:25c582ad33851c71b3fab4fac377ca29bddd8f0951a07163caf436b3aa7bc614
File Path: C:\Windows\System32\WinBioPlugIns\FaceDriver\amd64\HelloFace.dll
MD5: b6fe88286b993cc524b51d097367e412
SHA1: 7a501c8139d9164474500dd342d2f5e0fc5ada4e
SHA256:009c87fe462ea45ffa3a70f0e96492b087c94f39737eac2c23f3f54d5a245c26
File Path: C:\Windows\System32\HelpPaneProxy.dll
MD5: d41fa70716b8ecce20772e2560b93e8a
SHA1: 34c88336b05bf18aa6c76ea374e0f3956b017d9e
SHA256:3979ef92702e9ce86ea60be30853fd40d7812c01ccfe1803f4c4e0addb4f5af4
File Path: C:\Windows\System32\DriverStore\FileRepository\iastorac.inf_amd64_6ca78a08b838e305\HfcDisableService.exe
MD5: 8606029b80b75444e70dc27a0b52e8e4
SHA1: 8ab6a82d014b3318203f3812d4f1f4641ef5724b
SHA256:41080b6f7d203ac28773654cfa54c7a993022db7fa58aa6a6309136cc0dcfacd
File Path: C:\Windows\System32\HidCfu.dll
MD5: 279c793573271c98afb3b58898409642
SHA1: 39f7dfd558d3b25177281908bc34acb059f2d5da
SHA256:4cf80b9afbb8aa80d1ad59d5c382e4f8a8bfcf002923dd66c229b8fcb430b48e
File Path: C:\Windows\System32\drivers\UMDF\HidTelephony.dll
MD5: 50321150f520e88b4f84265db18d3756
SHA1: e958e555828e759cacf27939aeb60da8b08d272e
SHA256:c92c65836bc995df54bbf5ef648e2a432a5af29abc828a5927a305e7dda1d720
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvCamera\HighresBlender32.exe
MD5: 6509acd3cf6e03ee34ef16a83dc4fc28
SHA1: 8179ccd0ec3cb141f3264d04bd9ac5452c87e38a
SHA256:b81d87cae43116cc95573f24fe446c9c23d4d926cbc5a86c67cd50da04b8e136
Multiple unspecified vulnerabilities in Blender have unknown impact and attack vectors, related to "temporary file issues."CWE-59 Improper Link Resolution Before File Access ('Link Following')
Vulnerable Software & Versions:
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvCamera\HighresBlender64.exe
MD5: 2922bc3012895758a5e40043552f90f5
SHA1: 1fb9a377bed8905720e27294e884723ac645baa8
SHA256:bb1b2de66fad17eff9d90f9c8ce44b69d9db7ccd5b517156c35ff8a790279d0a
Multiple unspecified vulnerabilities in Blender have unknown impact and attack vectors, related to "temporary file issues."CWE-59 Improper Link Resolution Before File Access ('Link Following')
Vulnerable Software & Versions:
File Path: C:\Windows\System32\HoloSHExtensions.dll
MD5: ba4311cfcc39d571624f052384612f28
SHA1: bbcafcd3378c32c42b028423e0ab03a49e7ee618
SHA256:dec66ca72e27c28acad6350dd5f83030bc8e49539705f904d33e286c4d6b4cf9
File Path: C:\Windows\System32\HoloSI.PCShell.dll
MD5: 987432ddace0d9448c643907a9683e06
SHA1: 90a8543c961e5394bf6c47e7d0032838f58e9cf7
SHA256:d5aadc0da3d8a091e6c08cc71c05251b4fe20eb9aff6824cf25f4947d1ad0abc
File Path: C:\Windows\System32\HoloShellRuntime.dll
MD5: f222f9d6aea7f2c19e7b68fdf51eeb13
SHA1: c46d07cb83ae4037459bdc3822e34375c185e338
SHA256:f8835c13123fcb5546104b83a6cbd35fb46582b34c092bd65c54e7749a406b5e
File Path: C:\Windows\System32\HologramCompositor.dll
MD5: 91f6b29da8df3d66c91fc0640ae37033
SHA1: ffe8a1369c995455db4047e8a95b7cef417bdd56
SHA256:7c97229d94b8364b3ce3a094dc5bdcaa167de7636366aa6471177c5bd117b088
File Path: C:\Windows\System32\HologramWorld.dll
MD5: bb697565f8c256d0c37e3afac23b220b
SHA1: 9882c89daf202f037dcffcd79d0b3fa79fb17219
SHA256:cecd1be3e740bd8909d0c4e58d24db793ffe3492d5178cb91a73ceb356a087c3
File Path: C:\Windows\System32\HolographicExtensions.dll
MD5: d2b04ea70d25c6a60e3705d4ab05c443
SHA1: 304f878f684d64d4d04de8df5598155bc03b4504
SHA256:b34231041a1ccac2e08cc5fb6226a208fb5588584d5f01135cd3984755a23c10
File Path: C:\Windows\System32\HolographicRuntimes.dll
MD5: 86956475c6ffdac4a88bf7ec6b8303ac
SHA1: 8fe8a6729bdf7aabf6e0d956ec419208fb1011b5
SHA256:9541e341d71cd08628b013cafbdcffac686db1975b8fae7ac27232e92e5dd592
File Path: C:\Windows\System32\HostNetSvc.dll
MD5: 67bd4c16e7190fb696065a615d107386
SHA1: d99ba92b8782f47837438f4d93508b8a5f1ea800
SHA256:bf5586fbda37763f23105ed8da725f23194c3463f31a9e170aefdcbedddbfd96
File Path: C:\Windows\System32\HrtfApo.dll
MD5: d2ce149247a87875ee32b6fc8582ace3
SHA1: 69da17c55f2402c103d7f81f1a54a3db84496319
SHA256:e503c8179b348ec42836ad25b3b9cb74dd1bcfd597f57ac1bf217d34a4733b15
File Path: C:\Windows\System32\HttpsDataSource.dll
MD5: 470368cafb7fb9e7cb7bbee0895abcb5
SHA1: e7052184065fae3b5e5aa615f1b4c6a966ed56d3
SHA256:80114c89db380ce36a7ac0c9b78c6870be934009b3adff20b384eb98903eb436
File Path: C:\Windows\System32\HvSocket.dll
MD5: 17b15c661c65bcb45587e88a00b28187
SHA1: 6c9c16b81bc31f8703d5094c806f9d6bb3530169
SHA256:2d535ca4a8a0eb38b6628548b339c1242e01949792b65e6b5b8fb7f89b59f189
File Path: C:\Windows\System32\HvsiManagementApi.dll
MD5: e8fecebfc09a72cc4d0398c0224afee8
SHA1: eecc9c448d2fa506a71117beec6f08a56e8d661d
SHA256:2ded003ba0ebfbafabe14692c6d72f6b8d036988f64e836d8f70e055a087586f
File Path: C:\Windows\System32\Hydrogen.dll
MD5: e352c08460a8b83579d5778ac30d64da
SHA1: 2994fa525dcfd86d50c3a499f102e280cfbc262a
SHA256:bf4e719bb1ee92bcb4be439cb309f28ab84d5bb3109344d0e776fc8021dcee97
File Path: C:\Windows\System32\IA2ComProxy.dll
MD5: 255d40dbcad16cecad69bf7564456741
SHA1: 1c2a0e5cd51ad45645df10836e8ecb29ae5a0442
SHA256:21151b8ce8a5c0073d3346a7f515a129deae055bcfd8d27d0a2e1bcf1467eaab
File Path: C:\Windows\System32\Dism\IBSProvider.dll
MD5: b5b8c30b6eadc678f37d865061684219
SHA1: c78dc8160d7f0d794d6a156d9194f16314a0a361
SHA256:f1bcba5928da73db1a78355afd4cedb8d66e09d28fcfa6ae75112c5e10b0d841
File Path: C:\Windows\System32\IDStore.dll
MD5: 205b34ed26e563961e3fc10d20cdcd31
SHA1: a3e0930757b2efd8c62f1392d23b2a950de50694
SHA256:d7c8118073f36f7bd7e25458a08e50cefa2faa6168478c83c6a663350d749bf5
File Path: C:\Windows\System32\IEAdvpack.dll
MD5: 2dc2beb4880ca3f078bc5ed97d65137b
SHA1: 5ae19921cc2c484b1b275e6332e1f19ac4eb2e79
SHA256:efeb1c0931b7c62fb377535878c9cc549b60a67e3e9b67b01d00f4416b02fb8e
File Path: C:\Windows\System32\F12\IEChooser.exe
MD5: 15391d8cc02b31c857fb29a273f28850
SHA1: 994d5fb94987b528011ab698c99af66b55e42168
SHA256:b5c0b15ac6e01ad0a226328732ad43387afe331569030182db936a0d7e5a232f
File Path: C:\Windows\System32\IESettingSync.exe
MD5: 2b8ed46924019ea92b1acb955f2596c6
SHA1: f438c9bf09d6d66590505f877e9b46fb2e58f3fe
SHA256:82133c6318697fb58a51270dab9786e9406cbca7cee6c6f0f934ff78a0f6bfa1
File Path: C:\Windows\System32\InputMethod\SHARED\IHDS.DLL
MD5: 6de93ddbe223b46a940c4d5944ad45b4
SHA1: ff52381045dc421009cabcd94920534d29c56c66
SHA256:efa12aeb24c92017335f774b03c11f6d3645b4586d6c3e9248fc3f5d78a5d43a
File Path: C:\Windows\System32\IHDS.dll
MD5: ebf5380f75c9d05a158d94a8b4bfe119
SHA1: 58b5be467caf1aa0cdcc109805319d37bbdd45a6
SHA256:2ba72e57b11a6471d04dbb6375769afd87eb4aea951aaf50559519fa00bb4790
File Path: C:\Windows\System32\IKEEXT.DLL
MD5: a14e1d4d4421284a207a94aa011dbac0
SHA1: cb75f7e27ae37cfcd47d4ed0139945f9e56db752
SHA256:d85fcae135a7d3a3a9cd82b17554f019f4f57144b39bbdb1eb4f0db6113cbfe2
File Path: C:\Windows\System32\IME\SHARED\IMCCPHR.exe
MD5: e267a5d3caa7d1f643a861a765f743d6
SHA1: 4e3442c89012e323df2dbc22622f17f0482df9b9
SHA256:d3be3c4e976b0f7662aaf7c53961a2399dd44402afc9e6f4f7fc3a9af72dcb04
File Path: C:\Windows\System32\IME\SHARED\IMEAPIS.DLL
MD5: 6f1710bca4c7b66102397dc0a5f4f5a6
SHA1: 2318077ae3632495f4b3bfcc3784bd9d9711deb0
SHA256:652c8dd82a9765782ccd565d32b34124e367e8c0c453bd322f2afb1fa8221b4b
File Path: C:\Windows\System32\IME\SHARED\IMEDICAPICCPS.DLL
MD5: 0332bb0c3a915531476df9c035778454
SHA1: 7b925a22f474a3bad7b51fb3e80270cf50ebbc05
SHA256:13be011b5beee9b3ae87ab8f1a7c5665e42923a0a48818d18c24a5987ad90b37
File Path: C:\Windows\System32\IME\SHARED\IMEFILES.DLL
MD5: ac3ca29003b3fe71f9ebe4b3baeb3825
SHA1: 752606f8fc073db6fad3a7019d41800b48e4e0f0
SHA256:e4f3c5c61086f40c515825322dac799e94b4ff34440ced6e925975e5b629c428
File Path: C:\Windows\System32\IME\SHARED\IMELM.DLL
MD5: fb091c54d772a04bb4faf382cec7a009
SHA1: d418abf340e5b2021bc736ec420ebec65672f475
SHA256:617d6798050acf9981485d9724ca2a86d426c24af9c051373769a87501a9aad2
File Path: C:\Windows\System32\IME\SHARED\IMEPADSM.DLL
MD5: 0619736f9bf6fcba4caf2b31423697cb
SHA1: 2beb0a8a1a4e6417ed160691e7f0039f482f98f0
SHA256:8050b79d0db21b72e81b0ce3a0cccf9849d047d29054015b375bfb15ca201a40
File Path: C:\Windows\System32\IME\SHARED\IMEPADSV.EXE
MD5: 93d07cf6348e48ca334c78b9246456c7
SHA1: ef441b27578e8b3add19349e702d47b28484146a
SHA256:8c08d41e41e234a8b1017736762e8979fdb535d3bc5ba954aee65dd23d9184aa
File Path: C:\Windows\System32\IME\SHARED\IMESEARCH.EXE
MD5: 4af52db20c971825d6e6231c7b0c7dc0
SHA1: ad3baec14113eabd401c13a61ebce1de117760de
SHA256:a92c6e2a77bf8efd4bce1b06fdbfab982f277b0d57c0b598aff85544dfc0320f
File Path: C:\Windows\System32\IME\SHARED\IMESEARCHDLL.DLL
MD5: d011566ac06c2e20a2cd7228c32707e4
SHA1: 3356b4281f3098aa5d6c9451b3853b1a872d6b1a
SHA256:4b0b3a941bcb6d0d7251aca4e148149106b96bf269d0696f8245be7840937eb1
File Path: C:\Windows\System32\IME\SHARED\IMESEARCHPS.DLL
MD5: f086b955acd6cd07c6f6958f35930955
SHA1: c56be37947b0f304ae8296f94f56390f851178f4
SHA256:790c54baa52ad713912bea74ceb8cc9e2c4ba85ea1c2888fe8d3a68a76f2eee5
File Path: C:\Windows\System32\IME\SHARED\IMETIP.DLL
MD5: 7694903d5f8b8332ecc44a2993ec6c7d
SHA1: ed4a20f8a3657dafbb09fd2dfe6ddc9808823dd7
SHA256:09c6ff7d2705ba4daecba591452eb94085138322e95bb0fed3baafa2aeda8d08
File Path: C:\Windows\System32\IME\SHARED\IMEWDBLD.EXE
MD5: bff41670985b569e85ff1013a888163b
SHA1: 87a1d4b416f1f348d136e33671cf65c1d5a60a2a
SHA256:ebdcc10aeac85ad8b8c12e6e1cad52af24250aa15b61fc907ebe4c68638af809
File Path: C:\Windows\System32\IME\SHARED\IMJKAPI.DLL
MD5: be442f83c083286ca757e4da1b48f21c
SHA1: 5ce5af13209a8e16edc5bdf547cf0d3c89508b99
SHA256:3cd7909e92e9d4fcffeaf3893e51cb53e8ce3f47b5c53ece31ee4cf177567d21
File Path: C:\Windows\System32\IME\IMEJP\IMJPAPI.DLL
MD5: 9eef7993b57bfa627416289b177f0d95
SHA1: eccfc5c6c2b48550ea6e7445ef30a08958d89682
SHA256:329484df8d14fe08fdafb89071c6249d9a5328b8f23d6e4377a68cb16dff25e9
File Path: C:\Windows\System32\IME\IMEJP\APPLETS\IMJPCAC.DLL
MD5: bc59c0bdadfbe4bc98a53a11bd22cc02
SHA1: 9c833a434da739dc6e4da7059e5095c1c14b3ccb
SHA256:850695a01a31b8c2193cd054257fbed6e895d18cd14a64c4d9fe5702f4962c7d
File Path: C:\Windows\System32\IME\IMEJP\IMJPCD.DLL
MD5: 80a718aef3a6b691483ed47fec008c1d
SHA1: d755dad6d460a5b9098d594d27daeb589258580c
SHA256:6cff83cecc8e516c28e5b32528d92a6dff0b0f3f4e37229d1c253ed33c3e6812
File Path: C:\Windows\System32\IME\IMEJP\APPLETS\IMJPCLST.DLL
MD5: df780ac2c4b7fcc28bfd6f775feca6b3
SHA1: 59aebe989a3de7eb5744c2721ba170480aeff0b7
SHA256:82ee22e8771f243c37bb440ae23cf125e2ab335a4912cb57aaf9ec7644e95413
File Path: C:\Windows\System32\IME\IMEJP\IMJPCMLD.DLL
MD5: e3131d2ef7c26a5ee826cadbaa669cd1
SHA1: bae29ca8b79baaf72709f0d7f93c0594dc5131a3
SHA256:47ee881f7827cb89492e80d75315f30c5f9cd2c850bbdfa97a02836787c2a04b
File Path: C:\Windows\System32\IME\IMEJP\IMJPDAPI.DLL
MD5: 1723005e9884bbac3907a7e6786512c3
SHA1: 03d5a0001ae261603d98c72a0f73e876c47e7591
SHA256:03f8a5fc11aabdf7801013f12133a826e4f69a96f75fd32f827c627984b1724e
File Path: C:\Windows\System32\IME\IMEJP\IMJPDCT.EXE
MD5: 9fdbca90e2435c5c2aea47d7baa2c18d
SHA1: 7dc7aa886dbf2d7d260cb49131484ac5651d3b5f
SHA256:176eb311cd0935d17f98242f47dbe59aba00034bc277d67fe861d32e56958393
File Path: C:\Windows\System32\IME\IMEJP\IMJPDCTP.DLL
MD5: 417e1a82dfb645a9ae8dc47cfaea8207
SHA1: 4d5e8cc2dae2b070b53217f540ba74fba7389ce8
SHA256:0e55b302e142b296ba461824ec0afa29b77dbe707a3867e8f8e3702e47dff139
File Path: C:\Windows\System32\IME\IMEJP\APPLETS\IMJPKDIC.DLL
MD5: bedef89ad331442df4f40861e9f9cfc3
SHA1: d7c04e87825619d9b05d6f6d824304c646e2faba
SHA256:f2be36dd62a3d223379204aa90f1aec2d9fb65e9bd1dcc0ae1954b95f2befc96
File Path: C:\Windows\System32\IME\IMEJP\IMJPLMP.DLL
MD5: 7489abb42b2922a18bd92a164c6bda56
SHA1: 85f932e014cde8f0085aade24f18fd57a9653426
SHA256:5debc982008ab5a3802c6f1b3f3334e847185b93d4e1e611a619cbaabe6904bf
File Path: C:\Windows\System32\IME\IMEJP\IMJPPRED.DLL
MD5: 695b2ef4defc7c80868252df576c293f
SHA1: b736c18c1a8da97a80d5c1ccee7a6192336df3ae
SHA256:c45a456868063edb872d85407aacf0b47ff3a8df15ea7d6bb794e12503c140d0
File Path: C:\Windows\System32\IME\IMEJP\IMJPRANKER.DLL
MD5: 160bafba26a7f948947ac1b9031718ec
SHA1: 1c3b2a7731a17b6fd5bae99d56422cbe84ede67c
SHA256:143a4756f98dc3302465794447e41d8cb4922f6fa4c4e61aeb15ba0f7fba1421
File Path: C:\Windows\System32\IME\IMEJP\IMJPSET.EXE
MD5: c9c0ddd3f4d4f2023ceb5390b8b5186a
SHA1: 83ae10f098d1513dd058cef2daa4ae3e72fef2f9
SHA256:b9feb94ede06b04b7b39703a5623384079a35cd2ef0f5232f9d2c0fa7f6124ae
File Path: C:\Windows\System32\IME\IMEJP\APPLETS\IMJPSKF.DLL
MD5: dadf29420fd43e60892e620b840d88bb
SHA1: 9bf67bf4ee346757a07fc7cdd23225023281ae7c
SHA256:98b6e6f6e25017256f21cf1760947b41542b41356ad2f4c10f8aeca5540034f9
File Path: C:\Windows\System32\IME\IMEJP\IMJPTIP.DLL
MD5: 2121b273780f8af0a5e4d27606131db3
SHA1: fafd4ff6cbdb0f21774c1dbf303b632cc528dd4c
SHA256:1f66f00681a260e4becba2395e2fb3b8b57fb6e41950e9aa7887ae7f6d3c868c
File Path: C:\Windows\System32\IME\IMEJP\IMJPUEX.EXE
MD5: 08538a5d19db927b8644f4705a8fb6dc
SHA1: b6956c84ed85c67dfc61af4d2ab68e0defa9465f
SHA256:bbfe7d1c8ef9c0d66d5441ff00155e789e874c8ec16add8c24b87c008b0bf62c
File Path: C:\Windows\System32\IME\IMETC\applets\IMTCCAC.dll
MD5: c7bec8bb52b7ca8bde6410df4e3c4cfe
SHA1: 3033ce1078759992a5a0d36098b14767b75e3c89
SHA256:bc5c6e555f5b4789b3dfcce4ad54b305f4fdc3cfd6f851438ef77aa1c23bba03
File Path: C:\Windows\System32\IME\IMETC\IMTCCFG.DLL
MD5: e1b7f0464584930b746164bc971883a4
SHA1: 9f937773645aa5ed8f245768db5b1c188cb74402
SHA256:5a40d9903d993ece7660b6e2e9401d32286d1d03208757b45aa7f0bb025c5bda
File Path: C:\Windows\System32\IME\IMETC\IMTCCORE.DLL
MD5: a8c811f33f4a66cb2f26f6758e3bab90
SHA1: 3e95a09a9022212c7c62509ddba6f69f68167cdd
SHA256:bc208ae9e4e86f80f5792e20cfb71e708cbc2218f041d7a8d6cbaa0a515fc374
File Path: C:\Windows\System32\IME\IMETC\applets\IMTCDIC.dll
MD5: ba542eee2f31c53e5c44c7cadcd7d395
SHA1: 9e96cbf7aeed54347d7cbd59ff9b3ea2d69b96eb
SHA256:cc7a967a3ba708fa21584766dde7db5524e69531b75dd7ff67cea13383699a37
File Path: C:\Windows\System32\IME\IMETC\IMTCLNWZ.EXE
MD5: 7112a7ba132cc62aa1000290b4afc18b
SHA1: 7b03abaeb94a0db0dd451a2a6b30b24dbe3cff5d
SHA256:0d28a76ee9f5c65ddffe95a11ddc9bc42d259acc113e738d1136f39451d7b827
File Path: C:\Windows\System32\IME\IMETC\IMTCPROP.exe
MD5: 4fa717c6856b9d459aa5e575860609b7
SHA1: 179e52527b0a48acdb3c758981f19fef1a68da4a
SHA256:b12488f17f35973caa475f259a0ec89b8b821e79c5555053d0166f52f8877f07
File Path: C:\Windows\System32\IME\IMETC\applets\IMTCSKF.dll
MD5: 19ac95a7f69793a3b53d34187b9cfde5
SHA1: 49bf32a47ca2e8727d25fe9f873b522722723594
SHA256:01ffea126180512919b2c08377a793ba14f2fd31050f84661a10a7cbdc64331d
File Path: C:\Windows\System32\IME\IMETC\IMTCTIP.dll
MD5: 7724d24adecf4743a59e76177d155416
SHA1: e6082e904c3a35a52bd97c4f62c659732ab66417
SHA256:6b0e6c7dbdf202e53edfedcf5f7deb32f9dda27bd527486debd80745630f44e1
File Path: C:\Windows\System32\IME\IMETC\IMTCTRLN.DLL
MD5: 747b9e6cd154f8949080934a6d7b0b48
SHA1: 0ce7207aff5491fd292eee76f60a7f390300942f
SHA256:53cb32287993b655024b146165c63f971737d3a1ca99e7066559b5945682a38e
File Path: C:\Windows\System32\INETRES.dll
MD5: 0d8fdd24159df7489b5de870de9ffe8f
SHA1: 8ffca975520ba1a1f28590c6f25a7b1ef34301f5
SHA256:9509e06829a8dc96e70f9db2c7a618cd62376ef481531933df871b37a35658d5
File Path: C:\Windows\System32\IPELoggingDictationHelper.dll
MD5: d03270e04ad8aae2f808409db163567f
SHA1: 45edca71a1f75948c93a1963f1b23766f7d47036
SHA256:ae1564f4a670fe2635c618b95bb3597278875bec69435d6c12fb0d3f6d1e4b68
File Path: C:\Windows\System32\IPHLPAPI.DLL
MD5: 41160571d2dca49d050362f782bdb60a
SHA1: b9787ebfe426b0abda900f464f9ce6c2c6f8372c
SHA256:12cfa67d12cb37a6473411479b2afe30afa6a4e68b0fa17ec83de09d39a2d469
File Path: C:\Windows\System32\IPSECSVC.DLL
MD5: c148f6cc1dbf5eaf942e4bfb1caf13b6
SHA1: e5bedba56674d74b0b8e68dec0424c77ea2de3b4
SHA256:829b1f354414eaad06f44f384d48175a807361c32e9057ad36a851c2682dae01
File Path: C:\Windows\System32\ISM.dll
MD5: 9fad049c7f08998c38a5ad5effbde056
SHA1: 39d1615861ccecfde7cc6fb5d1ae319d2d3c244a
SHA256:5d23e4344c6b82965fb9c8425cc212d1f4b615e1033c921ce6789f0675aa8e6d
File Path: C:\Windows\System32\IasMigPlugin.dll
MD5: b25012a81937ebb296bb8bd87ca9e6fe
SHA1: 59f5ea3b403e5b2deb1229e896731cf88868bd6c
SHA256:9b37d5167a38fe215212ff61ad9165f2acef5079d320b63274bd4289552d7f76
File Path: C:\Windows\System32\IconCodecService.dll
MD5: d4a35b16de5815ae64a93dd7331f4eba
SHA1: a9d083787c69753af7056b0111b704f73cb9b56e
SHA256:839fd82ffd0847723c0198baed26348b734e1d2abffce517248d50a96919c6dd
File Path: C:\Windows\System32\IcsEntitlementHost.exe
MD5: 97cc4a7ea9e9ce445da93cb487e608b4
SHA1: e1ea39a5f3a41a47535a14686b5ff2967678c84f
SHA256:39b7c1af63dc3042cdbb40e3795f47bbc9e08fe8871e58c17746e14177857412
File Path: C:\Windows\System32\IdCtrls.dll
MD5: 37041c6cb2cfe9d52fbdee88428fb71d
SHA1: a5c8664342dba1d83c7a43afe16b27197ce8837d
SHA256:fcddde6213b716ae965ee0d4da2d0323187d1df5f69ef479a423138b00ef769c
File Path: C:\Windows\System32\IdListen.dll
MD5: ec4d20656b22703fed5724068fad55cb
SHA1: deff2b950e602bc92cb6fe81a7de9624e9431f83
SHA256:8f06e8edac08a7153ddc7aa54fcfd9014a60d028665e349e5657fa601155d757
File Path: C:\Windows\System32\drivers\UMDF\IddCx.dll
MD5: 6240f9abba33f2db904e1e56d1ab4350
SHA1: a71a5d1c360e783f8060f722d01f7ad4f6a357f7
SHA256:669704d3660a2d46f664fd816f5e2ec68d331d6e4c91e9fca6e61f9599de3e3b
File Path: C:\Windows\System32\Dism\ImagingProvider.dll
MD5: 1855154b8e5368960989283f6e29c1cc
SHA1: 8ad25644c3a6136cd99d375d8e855f72b94da24b
SHA256:e7d6452898ebe52080435aa1e3ff66bd9ef75abc026ba871f5763f105cf56067
File Path: C:\Windows\System32\IME\SHARED\ImeBroker.exe
MD5: f6197485f94147a852a322e3fe8a3886
SHA1: 4141383b896d84e3e072bb5332c1594b22b58ed4
SHA256:6b16dc03e8d72173261b8332fa15af5feabf5956861fc34c956fdf5a0d5af3be
File Path: C:\Windows\System32\IME\SHARED\ImeBrokerps.dll
MD5: 9b6ddd08fd83256120af3270ef5ca823
SHA1: b0e5dcdaea240b3f66981adf50fdd78cdf2e9b5b
SHA256:3cb02a616a74d6c21d056f24fbb10a17b1397b8d1e760dab9c2277177ba61725
File Path: C:\Windows\System32\InputMethod\SHARED\ImeSystrayMenu.dll
MD5: fbed59d735168d998015c4e68735d320
SHA1: 97e08310a9e3207732fe9357cf07a6f7dbc6acf5
SHA256:a0697136ddfa46e55c7f9bbffde4055202986e6c2e5d30af71d029a04d95285c
File Path: C:\Windows\System32\ImplatSetup.dll
MD5: e2d3fefd4163a30ce77cf8397dcf9819
SHA1: fb4648f7afd496b2c4d83d204b4ad49c9a1b9ad1
SHA256:dfb193175f16d5ecd3d1e76e25939cecb366e2635c17064046aa31b59ec333c5
File Path: C:\Windows\System32\IndexedDbLegacy.dll
MD5: 9c8c84bc83b7bffe8a2c7c79c1bf21d2
SHA1: bdee41e58b4f60f45381387b3789df2a85d5d930
SHA256:d70361eae1415115798f752b0a2939203c24c35637ef6eb7d57476a21edca88a
File Path: C:\Windows\System32\InfDefaultInstall.exe
MD5: ee18876c1e5de583de7547075975120e
SHA1: f7fcb3d77da74deee25de9296a7c7335916504e3
SHA256:e59127b5fe82714956c7a1f10392a8673086a8e1f609e059935c7da1fa015a5d
File Path: C:\Windows\System32\InkEd.dll
MD5: 6470ee6a9d89055ab3c01a9488c35bdc
SHA1: bfda9a2540f203a870bcc0a2791493d0ca0dd565
SHA256:ee9d04ba29882653b37c10898911b72bc46148e62d67eb9d6140026ec3a384a1
File Path: C:\Windows\System32\InkObjCore.dll
MD5: 54097a45d05023e305def629d2598615
SHA1: 56af2b7d1202bcc3a00ed2ea9ba01cf91214a0db
SHA256:2027218e4fc39a21d317a144f75aa4abc22fc4cb91c575ef2e6003d423d8b049
File Path: C:\Windows\System32\InprocLogger.dll
MD5: 95f78a572fac96715f8adf2c197a89ea
SHA1: fd0d0f541339251a2513280a710c63d42a1afb8f
SHA256:2aa62835a43c2abf78966c0d77838ebe590518872d75ce4659fa7b9aa2443b89
File Path: C:\Windows\System32\InputCloudStore.dll
MD5: a6ec52e3eae56459326097eca8a6ff7a
SHA1: 764c61f56cf0be24cdeb1bbe0d77d3d7d17ef93a
SHA256:e57a008033ab871d69d15c811ed0bae1490012c8fa2802d557d45389ae4c63bd
File Path: C:\Windows\System32\InputController.dll
MD5: 2c4c331d7b3c520d5a836207f04628e1
SHA1: a6074519ef1a44e6cc2addfae59fc571f50fe54c
SHA256:4ef525439b4ce881d9085b120fa88df294382b8dc0fc45170e81059e07531e16
File Path: C:\Windows\System32\InputHost.dll
MD5: b66a2b9bc38f2bf049afc20db6b07656
SHA1: 4640dc4a96827021517590f70ebb5dcae796a44f
SHA256:90a7f21d98a32eff640cc381ccf1590c2254c14e1c6d20868e76aeee52a7f863
File Path: C:\Windows\System32\InputInjectionBroker.dll
MD5: df4d36ef487221a025b03b8444c5b1dc
SHA1: 04cce745063059503a2cfda74d6d7fe1e75f631e
SHA256:4666308931f05bb22e374e980f21f9fdf8c6fd98677a385722c06d0e7bd50068
File Path: C:\Windows\System32\InputLocaleManager.dll
MD5: e0cb4c49916ec79fb07b82572b1864b6
SHA1: a2c1cdfddf335dd012c041b180e50c5937dc2d88
SHA256:8ac3f0c071a1e2c2fab407347a6cf2842e1919d2a9e507b8256985ca5e0fe057
File Path: C:\Windows\System32\InputService.dll
MD5: 35fcafe05576a920f41c7e564dcac8a9
SHA1: b9a7847aa9958b9692e452a1affa0665a266509d
SHA256:f19901a9db7dc570658018041926908dbd23054e5562c59589ca5ecedd0e25b3
File Path: C:\Windows\System32\InputSwitch.dll
MD5: cef0d21101a1eed6ba29317e1baa054c
SHA1: 85ff9fb2a0e0e4bda866802737a4b2b410acf727
SHA256:3867c8adc86a0c95a006535bef27558ee6c4b4637c19f4849980c74e6f9599cd
File Path: C:\Windows\System32\InputSwitchToastHandler.exe
MD5: 61aecfbd14174d3e2e1c9253c15f0278
SHA1: a8a112756c388da3b8f0d8da8c64ff443e00aaab
SHA256:3f5306fea9f8530df5b0619db9f54827fa938dbca1515389a4e69bab298af473
File Path: C:\Windows\System32\InstallService.dll
MD5: ea6db2db74dd4dc23de1df6d3e59587b
SHA1: 2a8b4ed84f586d6d5c38cca9f7fe40fd52286d1d
SHA256:b86ddee1dfcbddca41f3dc346bd2aec6e982a0d464c765a1a8121b3b355c7bbf
File Path: C:\Windows\System32\InstallServiceTasks.dll
MD5: 7a170d8f0db0572c77a95db9228210b5
SHA1: 7624e2e3002173a87da3ec4b0d01ef0fc199efa6
SHA256:cc5b45837f48d5e061445dc5ba7963686381d941e60798f0e76f95631261ba39
File Path: C:\Windows\System32\cAVS\Communication DLLs\IntelAudioDll_x64.dll
MD5: 40e1cdd5855e3fe91679733ae8751418
SHA1: b826d9bbf4e77359aaa7d58012f020ccdf3b3cd4
SHA256:c7912ad4924aed370e3dc15c3662258dd0ef3f8b3779f8fde500900d614cf768
Description:
IntelAudioService
File Path: C:\Windows\System32\cAVS\Intel(R) Audio Service\IntelAudioService.exe
MD5: af51e57be57a93b2704453b1810b3a5c
SHA1: 82e47aed10b2dbce2fc39fb6ad959bcc14fe9f76
SHA256:0c167bb10d81e3ef9357b90f4b20027cd8aac9aa7a4fcc4736b20b3ca0b7ac05
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_01d078da8c0f4900\IntelControlLib.dll
MD5: a809c210f911c824ccde9c20ab726e04
SHA1: 13917dc0dab8169bd72f540752c49ec0a7cff367
SHA256:a76cc5ca8723a9cf265a74a8f0468e654586f96ac820435c194d2aded4095ff3
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\IntelControlLib.dll
MD5: 89203e76be2866a1cb1eee8de16dd4dc
SHA1: 4553f81f6523d5d4f16987a61dc3d7391c5c6cf0
SHA256:e5301a64889a0cfedf2c9afa3519cc7b2ff693c17d4a313c4fdc8bb8f97cbbe7
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_fdde6ecd49c3a98b\IntelControlLib.dll
MD5: 8fccb9bc33a3dd381024a7fd1f5814fa
SHA1: 2c4dfc4bc5879dde18dbcbb23f42f5a451d85a31
SHA256:c6f290b1832d12939dd039aa04e1cec6158d424094689be83ff632dd6e69ccac
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\IntelCpHDCPSvc.exe
MD5: 4739ff6351d868f4d9b45df47a286432
SHA1: e200e070a8c4b535e8ec396c41aca57997412319
SHA256:d2880255c9fd94adbe3e8c5edf125bd06138352e9df158c5d8cdcb3cb9ad9be5
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\IntelCpHeciSvc.exe
MD5: 6505230eebda9763623d0dc758d94206
SHA1: 2d0bd279b3831e3a5cc49028ed902475e4fc7f3b
SHA256:62509f03f9d367ce8cb812d61e3d29d8aa232bd1378b54f417117eb0cce82bd0
Description:
Intel® Graphics AGS
File Path: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_9cf4db1a1fd1b22d\IntelGraphicsAGS.exe
MD5: 64df23091623432e6dbea0d1edd16c52
SHA1: 837c26375bf94db44b69bae63067df651d43828f
SHA256:75589084e67e166e77aa66919a3f4b12c007f1ac8604c04b7422051da7ca6989
File Path: C:\Windows\System32\Intel\HwKws\IntelHwKws.dll
MD5: 323465d7f2bea8610f3b32027d7cbcb9
SHA1: 3c7cabf422b4bd669a39afa050ad3d014c030362
SHA256:8d7aec875a7dbd115eb9605ba308b8a45df6b8c6f406923df496d12d38bd5ba1
File Path: C:\Windows\System32\DriverStore\FileRepository\netwtw08.inf_amd64_52e732d2b07d1e6b\IntelIHVRouter08.dll
MD5: cefbecc35d82885691c628b03abe5299
SHA1: a7614e526d71a3829ab9e72ea684a4dc70973cc5
SHA256:e10fc08ffdddb090c3ed1564fb86d57f676b0b26795438c19a563241b8c6172d
File Path: C:\Windows\System32\DriverStore\FileRepository\netwtw08.inf_amd64_a7d5181fb92b2a22\IntelIHVRouter08.dll
MD5: 5b0ca032e7f9cf527b83db3666a787ee
SHA1: 65e65d2f1b7f41db351860b4c87ed800533301f7
SHA256:4170fd0b0ba6adf2dfa6c342c874144820fef808cbf2114c91051a3709f8e985
File Path: C:\Windows\System32\IntelIHVRouter08.dll
MD5: 99c84f8405c9e46f429c22e4dafe6cc5
SHA1: e5170b7340bb2319a3a59e24146310a8956d2c1f
SHA256:ae6f524ee596d3fd33c012a52a077bb09f4cc6fd0e76eab02840604d58adafdc
File Path: C:\Windows\System32\cAVS\Communication DLLs\IntelMultiPaSetupDll.dll
MD5: 1d5ec876a981eb2f024324ddbdd69053
SHA1: fedb5e4fd49fdbe5c562232dd6aa2de30cc1fad1
SHA256:3bf5039d27cea8348fd34fa9529c24d6c8ccf7ec7984b979184e73f45ff86b71
File Path: C:\Windows\System32\DriverStore\FileRepository\iclsclient.inf_amd64_75ffca5eec865b4b\lib\IntelPTTEKRecertification.exe
MD5: 4ca78e13567113643deed53859035765
SHA1: e903aea36eb0290b74156f6888325c468a85bdf8
SHA256:ffedf59b0301e6fdd10e324353ee70353201ca389a9f17dbfe9ed321de545fa3
File Path: C:\Windows\System32\DriverStore\FileRepository\iclsclient.inf_amd64_e936ad8266d026ce\lib\IntelPTTEKRecertification.exe
MD5: e125cfe5edfe19cc85b09a3ee004c876
SHA1: 5d01656cb514f03ae42801aab89091736c8c6a10
SHA256:c1fd9c6fa43d2b851f6df156740fc034c6b77298c96630c426bae94a033fd2fe
File Path: C:\Windows\System32\cAVS\Intel(R) Audio Service\IntelSSTPreprocStreamer.dll
MD5: 1c91d8b8ea4ba89339a8062181fa193c
SHA1: 26a69b0941dbc34df6564448dc7085fecd815396
SHA256:0a6acbe20613dedbcc56e49414000ea21db2c32378374457aca52f6e6e6f1304
File Path: C:\Windows\System32\DriverStore\FileRepository\netwtw04.inf_amd64_c8f5ae6576289a2d\IntelWifiIhv04.dll
MD5: 5fa24eb837d4c47af497268c77e8d529
SHA1: 5b0993e8c7a8dd2f4d6de96e475626395ceccb7e
SHA256:7dc426295efa9647e4ab51e8fd10ff1d4bd81021d340d8c15544e466b1447a56
File Path: C:\Windows\System32\DriverStore\FileRepository\netwtw06.inf_amd64_2edd50e7a54d503b\IntelWifiIhv06.dll
MD5: 471deb3a9ea13912706d7e9c6e44a3b7
SHA1: 7e0404293a2d21b6fb6efdfe641637ba66c97a6f
SHA256:e418abaca399a2eae20ba21f292364c3cf2372c1ad14e52947251497d5867af0
File Path: C:\Windows\System32\DriverStore\FileRepository\netwtw08.inf_amd64_7c0c516fb22456cd\IntelWifiIhv08.dll
MD5: df3092271ad1292bf898d544670eb4e6
SHA1: 73fe2a9cfefc0bae2494cbc773424783c49d48a8
SHA256:b9004dcffe7ab63027e5b626878bf7cab169bbd94ee2289d7858af79e5c5a967
File Path: C:\Windows\System32\Intel\Service\IntelWovSDK.dll
MD5: 8915256b4d07862f9cf4fa256d086096
SHA1: 00be48fef9adcaff17c93f4a00fe4e7ecbe5f709
SHA256:ecf898b4d5e855c5005df82014fa711c93781fb49ee8f8fd7555a5c708ce95b1
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\Intel_OpenCL_ICD32.dll
MD5: d0b83617f67a3e960da2e149778c32c8
SHA1: 4e876b9562ecb10f03e2dbbdd1de76fe3c9da013
SHA256:2d0db61dd3854f42076833c5cc0da7a5493e0468c4d937f2562999d3ab062490
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\Intel_OpenCL_ICD64.dll
MD5: 0d21ffbb2e908d53468606f1103b27c0
SHA1: d2617e7046e97a863136fbf179ad48bd4e651e45
SHA256:002e33bb96934f23367ccea518ffea47c27ae55cad29369e716410fbfce9d1bf
File Path: C:\Windows\System32\InternetMailCsp.dll
MD5: bdbbd3fbcb980e0ea4e85bdb159fe4b4
SHA1: 0d198caea88bc1240c5a690ad0e4c30fbed7e0a0
SHA256:5ff7ce9a618435285f4d270a8aa3683b2bc40f00d6178a45ae6e6a1880bcc422
File Path: C:\Windows\System32\Dism\IntlProvider.dll
MD5: 18d4bd2bc601dbd4ca32e46f052fd152
SHA1: c0c04c30b9248c06a4f488d7921e1067518f2a2f
SHA256:207c51a4acfb244f05804b54c4d4f71fd5de4745434e40c969d888a4109677df
File Path: C:\Windows\System32\IoTAssignedAccessLockFramework.dll
MD5: 9a8927b224771d05f5d7b36ea8e55504
SHA1: d1ba3acc7de35f09ce5890f7fbdef6bbab34a6c7
SHA256:c9c73c91f8d267ca14655011d2630ac425b92a399372750346b57fe4ccd46b59
File Path: C:\Windows\System32\IpNatHlpClient.dll
MD5: bd695d535ccd2d3a8469d91995b4cbdd
SHA1: ad54820f0677de27ee5441e3b0a03efa27f9bafa
SHA256:47b510ddad57ad30b1fad2f7a5450886260156260d82aeced1565b41ed1d5552
File Path: C:\Windows\System32\IppCommon.dll
MD5: f373504454581802d36c91fd4f8bd2ca
SHA1: 6f8a0f64f67ac80c6dfa18561cb9960718ae3c14
SHA256:8f0d0e349d212ddae167647ebcfb14f9cc69712747b540875cc092a266417613
File Path: C:\Windows\System32\IppCommonProxy.dll
MD5: a670813840029a4b2c098b2ae8023776
SHA1: e7717cceb8448777d4df11d30c470587500fb348
SHA256:a7a59b7173ca13606f0e57159f9f8e580d3e478db3381a4e96a07f1ca693203b
File Path: C:\Windows\System32\IumSdk.dll
MD5: b27e2b886da33ac7398b90f3753237d9
SHA1: 1f2313801c973095ec5a2d8603f4452d5c297478
SHA256:759398bf89295a9e5161034fa0255eb2a8efc332f64239fad72048576b56e7d6
File Path: C:\Windows\System32\DriverStore\FileRepository\dal.inf_amd64_0b214be229a13e84\JHI.dll
MD5: 4cadde01bbc00b41489aafa483ce7091
SHA1: c010a8790eb4f8fbe96a2062e267d90b30f4b195
SHA256:0e4e06b480c90ba34947fadc87e33987edb18367b1bacb2e335af94b6174ae74
File Path: C:\Windows\System32\DriverStore\FileRepository\dal.inf_amd64_5acc9ca73ae7cf4c\JHI.dll
MD5: 078f379fddbda033d2f4c6c0cdbd0c23
SHA1: b3740791585f6b24db4bbc7fd2769debd9a933c5
SHA256:da0a5d2a9cb256024320d487a605794c8a527beb7c20ed434cb9586e8c032b68
File Path: C:\Windows\System32\DriverStore\FileRepository\dal.inf_amd64_5acc9ca73ae7cf4c\JHI64.dll
MD5: ce97736953f7c9e2ad1c596fefbc28d3
SHA1: 83f3c8ae48bd5ec715afe64bb5033066ef48150e
SHA256:975b014af806096598de856c286a44fe8ce438942d1ec57b8d5bff0329a12625
File Path: C:\Windows\System32\JHI64.dll
MD5: e1bfcef78292701fce6070bbdd85f450
SHA1: 3a62df501209ffa811d5eb5d9caa3c857ca2a24f
SHA256:c3a4326aa686fb66cd790818a9de173b80e0d07c123392670c1771d082868c39
File Path: C:\Windows\System32\JavaScriptCollectionAgent.dll
MD5: 22f3ee6a9a2b956d492013afbff9cd11
SHA1: 48e216c736110af1cf3087b3b55e9676d92ef781
SHA256:0698daf8e42c53e950665cb5ddf6d3e61e111db7ae0589a0ea7731e76ab115a5
File Path: C:\Windows\System32\JpMapControl.dll
MD5: d24e7448d229a078a28d32ce9f2de0bd
SHA1: d965089f975234f830c77c7a7b09ff19877f91fe
SHA256:b49a6de7cf0639171666593407c722f5a64b0ac6969b86762df4269dae58341b
File Path: C:\Windows\System32\InputMethod\SHARED\JpnKorRoaming.dll
MD5: ebc8b33df99df7085a63fba546d7a825
SHA1: 2001e6f98dc9ab5d49ebff10f9a033153ea32422
SHA256:fa2b46e30f393635a76d6855a1118dd0dd4c0755b8a5a4f8e1e1570094635042
File Path: C:\Windows\System32\JpnServiceDS.dll
MD5: b5ec210c555bb36a274290ba6a9d0ac7
SHA1: a0bcd918e00b13a3c7364eff85a1b9ac0f70c4d9
SHA256:6737189adc75ff269ce22659e77a322e26fd4a4d00237bf472fd0d59ec3eeda8
File Path: C:\Windows\System32\KBDA1.DLL
MD5: ce2bbd36120f3ca23edeec98acba75f8
SHA1: 491b246dc083afbb6b0b261933787cfda1a0c73b
SHA256:c8002b7daaa5a6c1d2aa09507cd663113c1ac765b412ad41115d8341dfaa7103
File Path: C:\Windows\System32\KBDA2.DLL
MD5: 214aa73291f6ab887ef26a66bce94aed
SHA1: 3ca58609a7e910e32e2dc5e112ed80dde976853b
SHA256:ba86bf23a8b6fbaa94749d572d9df0c1e8bbe50f709b8179b52f8fdffdb5429d
File Path: C:\Windows\System32\KBDA3.DLL
MD5: 37090a2bb21da2366531725d277007e8
SHA1: 131fa250251591f50080e139e9659aed83ee5319
SHA256:e8d963e1204ab7d0ff1438ecfccc1e87e30c9dcf528158a84b0117e1e5566c6f
File Path: C:\Windows\System32\KBDADLM.DLL
MD5: f77b09143add423257bd630efaa9db42
SHA1: 753a35e5d62b9f5a0642a6fb9aa1c420c2f2bc3a
SHA256:818657c156768f407a04ddeb3afeeb039af7073435322318c5a3e1c24df6198b
File Path: C:\Windows\System32\KBDAL.DLL
MD5: 968a5b98e5b7ace42bdb9247ef66a9b0
SHA1: 0cdc38d2c9c2c5264337fab44f78f09416abf37e
SHA256:6113c5a963818ec22ac26b85345c07e723def09d13deb41a73c8779be4d84f38
File Path: C:\Windows\System32\KBDARME.DLL
MD5: 7f5ad86b9f7ccc7f7ce9d4e5170a94e6
SHA1: 206712263f51f6a9e5a4ae4fac163cc329e781b7
SHA256:415ce966256939094bb504556d27da6578c31b7e95cc2c8ff2fe7edea3a2a28b
File Path: C:\Windows\System32\KBDARMW.DLL
MD5: 8e2b0617e2841aa8a82363f05cfcda57
SHA1: bd936118d6664b46443e5ede8b8fc2194324e116
SHA256:c6e09b9472e72ededd8982e1d6c5e220bff051d88939e7b2a5ea07183e6a8caf
File Path: C:\Windows\System32\KBDAZE.DLL
MD5: 3bc5018fed7c1c313acb5129494be0fe
SHA1: 757ae42a023fcfa8566194530ab10042dd196672
SHA256:16ce54b798b22c91c0a583c96e782f96510e25181242b4733fa19b8882ebc55c
File Path: C:\Windows\System32\KBDAZEL.DLL
MD5: b0c67cbf87a8ba04a3cc139853a26691
SHA1: ab3100cd12495d98a4d3fa06883c899174267e3f
SHA256:6b52e12c5c2a903b2f534a9daf6892deac3c5310af1ba20fb7f973bac981d5c4
File Path: C:\Windows\System32\KBDAZST.DLL
MD5: 3f6765fdde2aa8476a5f5ba913c6feb3
SHA1: acad70aa07e48eec30f0f1b98cd62442c9d3d3d1
SHA256:280ddb65db0107c6eefa21f295053407a836363f1afc90d8b9a78465b129c402
File Path: C:\Windows\System32\KBDBASH.DLL
MD5: 8f18572d916e66234d6c978e66de2516
SHA1: 3544e5a7217ec2946107cb14c4b149c6b37352d4
SHA256:df6abee90b0753615acbdf46c31f3a6e40c815121614a8b7d787a8039475f1e0
File Path: C:\Windows\System32\KBDBE.DLL
MD5: 576e471ffd0448276fbd1d48b886c512
SHA1: 56afc59258105bdbd68289a82d1107e60ae28548
SHA256:1137c0fb53cb37ee8a8480fc4e914e8c77fa1aebc3a619d54e709922885ae881
File Path: C:\Windows\System32\KBDBENE.DLL
MD5: 30e9e5c7cb480bb699baf1e3eb1b5849
SHA1: e4f6a23bc1efd1a1392d0b988c4a71d038fdc1fd
SHA256:dedae638643a97e722aa5208701c8d1fb589fc3e6c3609c114decb25a13cecfb
File Path: C:\Windows\System32\KBDBGPH.DLL
MD5: a9849493d69218e6587e688e6ef5bf71
SHA1: e50d8265e4424090464ffbd0ea4abf6bd0178530
SHA256:2111a08ca2c2ee1746f85bc20346c2b50ac612f2164611dac8fb32682ef71917
File Path: C:\Windows\System32\KBDBGPH1.DLL
MD5: 124be893e254e0c0b22ea1bd56eee616
SHA1: e8d36a2359d177a45abf62a4ad4470d72b8b59a4
SHA256:eec523e279b640e4e74da2b376a5846d2b9f4770219587095ceaaaf05dc03c4c
File Path: C:\Windows\System32\KBDBHC.DLL
MD5: 91a0866c6ce2e8acc8a43bcf5b81021e
SHA1: 09c92c216d8092785f98f407fa187959b45c0d64
SHA256:c51276f02ee17324a73b8c8c205fa9cdd8449f2655f1eebfbd56e26e751c6603
File Path: C:\Windows\System32\KBDBLR.DLL
MD5: f7761ce5f1d1b7193aaab39b8b0e6b37
SHA1: a502e3140ed1efd1d7d050286863f9623eef79fd
SHA256:2a92f80ff3bba6b3fdc1f7350812ee02b863f335819330f2537d5b7f2e9de087
File Path: C:\Windows\System32\KBDBR.DLL
MD5: 07e59103e3002d2cccac7e297e4cc667
SHA1: 6733248176fe3794ebda644cd08e0393d34e5015
SHA256:604c4b126d0828431f7b4fdc43c27809a574997eb78f89658771b442529127b4
File Path: C:\Windows\System32\KBDBU.DLL
MD5: 3273ad2ca8035a4732f9077ace9fbdb9
SHA1: ea3651c7813b6b91d5b28b957ad225682641406f
SHA256:9f725848f524bbd71e1fa560f001de3881c13d8acba410a9f01f107347e73236
File Path: C:\Windows\System32\KBDBUG.DLL
MD5: 35ed21e42a39868d02fde63129246707
SHA1: 185a92c4b7248378dace303957364e8a840c7672
SHA256:f13ba7a63f62a214979c1440047e1085eb5dfdd7946c9d4e7d500583f44100b2
File Path: C:\Windows\System32\KBDBULG.DLL
MD5: ac2dd0e2ae907614d8020489d0576677
SHA1: 0afa74e6536efc7156473b6294640b65b70b9227
SHA256:e12aeae3994e6b4ca27393d658a10969feec75fabbb42bee22046c16a0889a38
File Path: C:\Windows\System32\KBDCA.DLL
MD5: 0baa400b34576556d9ee8a64c1d916ee
SHA1: fea0d4adb05222d678231c3361924ea4658519b7
SHA256:86ccd97dc11d46da2da1c428ef917020ad8e05f4c3a1a1e79065ed97a2e29d15
File Path: C:\Windows\System32\KBDCAN.DLL
MD5: e31b1d860f2acc811b413e263b8a711b
SHA1: f30be8de7c879e2352b122c8336a58811299952f
SHA256:cf98619c2a4f7d9d6e691d19a139b06eca10d270f471c7cc0a7f30c4579c7310
File Path: C:\Windows\System32\KBDCHER.DLL
MD5: b8ba0878bac9b78de254d0a4516071ef
SHA1: 9db8dd835dd710a5832654a3facdc41041e3bf65
SHA256:48efda6f52d62a3697ac8c312668314c9a7f22fe81412cbda11504e45d86cb6f
File Path: C:\Windows\System32\KBDCHERP.DLL
MD5: 1f99c14850b5cea577a19ab1da9e3c34
SHA1: f249389b22e2cb5364dd7dfe7bfb613632b00db7
SHA256:daf86da0e7a57948a70b8b2c17f75e4b3c1542401535e646057a389076426690
File Path: C:\Windows\System32\KBDCR.DLL
MD5: 49364264d4ec2c8cd29e5530f50c0877
SHA1: 1bc46e865e7493b8c003738271874647b3471fb2
SHA256:3b0e8ed966b31f897aa729ceb69d2a796b3d4166053bf73f0456438aa1262873
File Path: C:\Windows\System32\KBDCZ.DLL
MD5: c232f446f1abce5859f5c78467569b31
SHA1: b065ddcd15a87856df0930f77643de79d3e04ef0
SHA256:44d5f875294c71bdef50770164d5c4de680b696b54bf33aaff2fbf31c01046b6
File Path: C:\Windows\System32\KBDCZ1.DLL
MD5: 1682e826e54a0070d88ac60a9f67ed6e
SHA1: fb7cb9980ee4412f519d729d129f34aea8185ef0
SHA256:8fc4d83bb30d6a1fff09b9b843e9fd175202afce9383486174db268f066cad12
File Path: C:\Windows\System32\KBDCZ2.DLL
MD5: 370cb48ae4a167f167c071e86753b0fe
SHA1: f6296b4544e6e5837a48d25accf74aa96b1dd2f7
SHA256:406ac3e14d3b832ca409566d556f713d5ff69568ec9acecb3d1b9edb1315f31e
File Path: C:\Windows\System32\KBDDA.DLL
MD5: a79ca2ff424d3e0a7839e7b5df698ace
SHA1: 5d1fe30007f001dc06c3609aeaa8111d2cf859b7
SHA256:e27dcdf83a2ca66e9981f28a89c8a6343d74049d96f7566d41e93c7badde8163
File Path: C:\Windows\System32\KBDDIV1.DLL
MD5: eb504cad4dd630752de1ba9e302fea07
SHA1: 28bc9e4151e2c833deb9c38aa3ccb38a2b4cd01a
SHA256:d97143f0fc9f7ddf66cd7fa010cc976e0f63208f041d45bc9197b66e72793086
File Path: C:\Windows\System32\KBDDIV2.DLL
MD5: a0a03fb482dfbe6efad193735c66e011
SHA1: d8afe88c65d34fecfd8f54ce8cd658df8a3a2680
SHA256:7d2c7ceb3b17339deb816618415a302f173d8666adaf2d32db9821febf0ba33d
File Path: C:\Windows\System32\KBDDV.DLL
MD5: 9bf0e962593f2c4eed8f7f1d4b3bb377
SHA1: 1cef8f00dbebf708567151ac452c78c1a341b369
SHA256:c0fbdd3b306388c44fa4f56894b5aa4c4a518347b58640e41263b1f93aeda287
File Path: C:\Windows\System32\KBDDZO.DLL
MD5: 74342b2e1587e6681c555d5fcb4c6343
SHA1: b30323c75c1af342c7da8d97933fc6d0c0880c67
SHA256:a8a34533c184bae893f11a3749a1c10f19f792662e762a2a7fa16e4e9468ff8c
File Path: C:\Windows\System32\KBDES.DLL
MD5: 73af39745a783452689edd5e75027b2b
SHA1: 9ffc3dbedeadddd89b161a73936aebc666934500
SHA256:56825aabd3792f9a5a1b68c466b82617c1e61f830dc6297c509bd50423d0726f
File Path: C:\Windows\System32\KBDEST.DLL
MD5: ed30589dfc4513510bc16a5cc325b6fb
SHA1: c8ebe7ffdb6dc000389e571b7e2f793c45b9daba
SHA256:4390acd287affdac514033723ffd8863912d2b1da5ef269de0dac503b336ea30
File Path: C:\Windows\System32\KBDFA.DLL
MD5: 498fc0ca1221d28a3926e864dfc1438e
SHA1: e2ccfbe85226151c6bcc08871c2148aa67f5a00b
SHA256:cdfd17c17ec6487c501442d40989fa0260fb3afd826dc13b3ed530686ca9be58
File Path: C:\Windows\System32\KBDFC.DLL
MD5: 807288648d6a2f500a771dfe3a602e8b
SHA1: de87c01d070475dd910dcc24b6ea76c4319c62ad
SHA256:9d146b0d802a86dcd0c616659d730f30de87b76090a1ef469b0f60c7acaa4dab
File Path: C:\Windows\System32\KBDFI.DLL
MD5: 1c0806f6c42a4c8162198a40b9a7824d
SHA1: 950e3aded60dcd4409996eb372d883bd6624fdad
SHA256:5d89fd45fe3ea3af748dd82cc91b3407e3bbf9859d2960358b2560e46dcb87f0
File Path: C:\Windows\System32\KBDFI1.DLL
MD5: 265ae89b3eab4a502e9f2ab04ac951ea
SHA1: 9705622bbcef0b2775d3d2788f806c7db310b8d2
SHA256:8e724b6a721774bd170a0d87899e2a936b3de2a000cfa0e32a828f29a95c17b0
File Path: C:\Windows\System32\KBDFO.DLL
MD5: a87fef8b49f9de19e61598c55a938fce
SHA1: b972bb1ca428c1a12c29c631f031361364fcd766
SHA256:290d98ed198d22f2fb74f416e73eda5acc1bdc1954c2d50bbaecd412c3c27198
File Path: C:\Windows\System32\KBDFR.DLL
MD5: b4bb58447bac6e78f374bd36e459e1f3
SHA1: 801a9ccbcc9b02ad93e1885763b1266f267c07ce
SHA256:5b4df6727dcf05001793c7758ef15eabb2a1b7ead28ee6feb713fb40ba7936d2
File Path: C:\Windows\System32\KBDFTHRK.DLL
MD5: b1d16f10cb242969951747927db0fe6c
SHA1: 901cbe5f0ce4cb164dc27e8c2f95411f629d5b99
SHA256:f12809220cd8c761a7497fc1df01dec49883ac99f810c9ac8bad436441cb9cb2
File Path: C:\Windows\System32\KBDGAE.DLL
MD5: 1ac234010e98bb65469b9dde4b956b6e
SHA1: 97a83df82ced2cc6305512f7eaac52af3d5fda2b
SHA256:4d28233eb97c6bc822c4ce1875e4357f70e276875c774c4f42ac971dc9ec04d4
File Path: C:\Windows\System32\KBDGEO.DLL
MD5: 953bf19b13aa43e3a2e3cc046a777c86
SHA1: c1ca4b8ac426f7fb95551c8dd706d177e3ac128d
SHA256:bd536627e95c0cd9f9d9e87a4f238be129d6c284af8c53cf743204210b9c4f00
File Path: C:\Windows\System32\KBDGKL.DLL
MD5: 5ecef278b69eb942e09bcfd3676dbd0f
SHA1: dbe30ffe7a3ac4e2146f78baa07a44b291d96381
SHA256:8004e3d78cdaa81f09338b8f7716689f26a12fe994580ab126af2098157b1bf1
File Path: C:\Windows\System32\KBDGN.DLL
MD5: 43e8dfff4c2b42af6496bef07b3b7db2
SHA1: 24f10b09ae70a5b53c2c516adcd27f08df59d19b
SHA256:c481443fdc4f5180d521c028f5902617d3089fb8bac8d62eb022c9fd718eafa5
File Path: C:\Windows\System32\KBDGR.DLL
MD5: db0b3f86cb52c9e729d12a61e91e1f43
SHA1: 076b2aa24d87e0f13d8b13003278867d5670685d
SHA256:16184a391248b062753c98f9aa0ec6d47278db4a067352d4c6aebc5625cc9ccf
File Path: C:\Windows\System32\KBDGR1.DLL
MD5: 063ccea245300c450513ea5242024c66
SHA1: 7c12f7677ad7d8953564baa05d7ac040f7f490d7
SHA256:dadd51d21a574ec2578f4156a748906922f0700e904f79ae1bb7c8d661b6ea6e
File Path: C:\Windows\System32\KBDGRLND.DLL
MD5: a6e1c194bd88187b8546b6efdcd9366a
SHA1: ce19bd52dd8acb4e94ae7dcc834ff73b0a7d7872
SHA256:4f0d1bca7bada52bf33e1578489842ebfe49e6f7088b202c5380e648621ddeb3
File Path: C:\Windows\System32\KBDGTHC.DLL
MD5: 31ddba089cba03f42d0b0f7c740b5173
SHA1: 251aff6e8ae1df5f381dc4538a84243b9db59303
SHA256:aab77e018affdf23064794ea595ff57ca971b7e6f51bc8bfb9a41eb742bff84b
File Path: C:\Windows\System32\KBDHAU.DLL
MD5: e152f0c766e5a5c9ce66ba001da7acce
SHA1: 4c069b1d59df6a89ba5f1b21755b18730696898e
SHA256:0979a3e0527fa59eb2d9c0856e544b16c14bda1dd989d90ffc923ee5e7713a46
File Path: C:\Windows\System32\KBDHAW.DLL
MD5: 2e2fea6b11933c4e3764e48109cede0c
SHA1: 84398321ebedb539af9c9ea3d1381de05edf11b7
SHA256:c92b8b0e9aa5440fda6b067a60969ac88280717fe66eea141837906c8032592a
File Path: C:\Windows\System32\KBDHE.DLL
MD5: dac785be03281dac6da8f44917bff4f6
SHA1: bc342f993858c20fdd2b8b3ca47e7327d6c6a02e
SHA256:67bbb48668b6ef6ced175de08ef0eb98f1ec64b75d8aafe55e624cd5570b8554
File Path: C:\Windows\System32\KBDHE220.DLL
MD5: 0c1b55737ccc6200f0e402435f1655ce
SHA1: 5b86ff9add4af6efa02f925dcf31094a9e5ad856
SHA256:e03e388db27d47adafab0047e8867818a4f863217e8a9717eca6239a7d913bba
File Path: C:\Windows\System32\KBDHE319.DLL
MD5: 98c1ed27bd0347bcf92a9c450f3d8092
SHA1: 27763b6493836383fd2dd647cdf9d0b2a98aa576
SHA256:bf1511d4135c7d8a6d5c412d1b4ec0caadcd043fa694121ea82ac1b9eae6bf53
File Path: C:\Windows\System32\KBDHEB.DLL
MD5: cb5d79fdcdf19a223f89b23636bf23af
SHA1: 033fc78cee480ff81bc95b708db0dd9a57a5cbae
SHA256:116fec9d6fbffb35f6224e1fbcbb3f4a0e2f6eea925e2ca05248e381fe0b8885
File Path: C:\Windows\System32\KBDHELA2.DLL
MD5: 0a38bd30c3416976182facda4d30b235
SHA1: c0f6e4c721fefd50ccc60867edf807cbee5de703
SHA256:9e6b7351f52fa20f51834d74bf3a356176ebafc28da5471cd5a6faafc68762b1
File Path: C:\Windows\System32\KBDHELA3.DLL
MD5: 8a8221b4c035fbf21bfe403c262c1ba1
SHA1: 79304b8198f26954d62d30738ab32540a66a1801
SHA256:d9cb98a1f323e57e047052701d986e1c87bb8ab65a9a4b9214a3608df3daa932
File Path: C:\Windows\System32\KBDHEPT.DLL
MD5: 0aae5769914a091f3bacabe29b55d7fa
SHA1: dc75bb552a296b05b5c487d43c603978601f2529
SHA256:e16e892c0b1c7cd9ae30a911e951dc3ff20b23a51206b75e6c9e093e6a67c562
File Path: C:\Windows\System32\KBDHU.DLL
MD5: 108452a37f3a93aa57e478e5e9d50842
SHA1: 4fae0d6b6d65e120a11ae92518d3b3887591667f
SHA256:d0ee94558f8eb8da4fee3f07f6554f4557506560d8c645f805f09ab0b1f52124
File Path: C:\Windows\System32\KBDHU1.DLL
MD5: 354cabc08c71bdfcdeec095157908591
SHA1: 06811115687e7dd75e468250620345cb08b0b600
SHA256:74f2a958262ca3f522e01e5a12cb1f1ec008f50bf4a278022a81d41cf2392afa
File Path: C:\Windows\System32\KBDIBO.DLL
MD5: 6b52f3bd777952882cc8f3f369b53a23
SHA1: defbb4df398e97ccca423c2538acd8efc040118b
SHA256:99c7cf7dc4a877150aada44b1b5fe218bddebd0a1e2fe8068142d5762a5f9a26
File Path: C:\Windows\System32\KBDIC.DLL
MD5: 34b4e8e8687fe822e96c6487d1f6e5e0
SHA1: 4e714152d171bc3ed448bf602ed728461984fcb3
SHA256:05de54c4d719c131245be7b2ae25553c448009efd14288710e3e9fc2f57b3343
File Path: C:\Windows\System32\KBDINASA.DLL
MD5: e124dd28bb5844b13e4059d9c2738563
SHA1: ffb480979a89c3ef311b12fd29a961d9cd1df489
SHA256:0d1c0a76f380dcbd15fc4a98249aa399768c6d59f553103ef29c781c299caa6c
File Path: C:\Windows\System32\KBDINBE1.DLL
MD5: bcba1e9745328bb40547ce1bee44ee8b
SHA1: 38c85e835b63a268f6a45682a6f0120392cd1ca8
SHA256:28dc2149cc13305d96b569f770629cb341f609fc2053a7b85b6873396d4dda7c
File Path: C:\Windows\System32\KBDINBE2.DLL
MD5: 475da65a84ae26026040aec8782f69eb
SHA1: 622d34fc70fad3f963953df178398922cac8a44c
SHA256:c56da48a8ae01ad3a363db2b6272a488982a541fad0f9760ef8a4f23802f8435
File Path: C:\Windows\System32\KBDINBEN.DLL
MD5: 30987ce82bc60bb2c1a0b1c0c5c5cd9b
SHA1: 7c816814721344b1121793c69e4d04be7273c87e
SHA256:005b6616033a31e1e18efb362e13886987fc728f5a97160e380e1f9f5a7d30ee
File Path: C:\Windows\System32\KBDINDEV.DLL
MD5: dff55054658cda4f85a88551a5b31883
SHA1: 7601c577a7c721c11c2448e2b156525188edddf1
SHA256:ba2b7c620c22b7fe931a4f1e1a0e11406be72a27b4315499fdbb0bc10f5062eb
File Path: C:\Windows\System32\KBDINEN.DLL
MD5: fa24d00c05c3e59c8be627341b16a8d7
SHA1: fc3f574d6e9ca112240d47b4e172c22401334cbc
SHA256:4a9aa7361c16da420b2c29026ca196589dcacb5dde687d3678b7231bbe3c806a
File Path: C:\Windows\System32\KBDINGUJ.DLL
MD5: ffbe7f718a66d8055811041e24151b25
SHA1: bc408ddf68ddb05983802302a227f5c8d7704740
SHA256:1a8fd8d31c20df7a02f2b7f6732e08d6e0826c03e1c1551731125b4ad67da048
File Path: C:\Windows\System32\KBDINHIN.DLL
MD5: 5864f6466ed085393552d6ccb94710dc
SHA1: 406de7ea7ea31ea0ababd4b890ef96347aadae9b
SHA256:d996f882b2e4b2b93ee033f9eea3d98f479bc644bfabeca448089cd1453ba0f1
File Path: C:\Windows\System32\KBDINKAN.DLL
MD5: 7494d369446ce2f900e27604d2f5aa73
SHA1: 7bb91367dd2ce2e8c9cdb4b3a9210d89cc141152
SHA256:1d2dd7f974961b974f37db5e6c2de36570c3eeea83078500eda989710ba52af4
File Path: C:\Windows\System32\KBDINMAL.DLL
MD5: 34f40aef7dbd60941258a50ef25d9628
SHA1: a67ef95a1be4fe1bb16c53535ff8d9c3ab1aa8c0
SHA256:0b460e48e3de73adee076aa1311c269385e601a35bf57000bc286cf2313439f7
File Path: C:\Windows\System32\KBDINMAR.DLL
MD5: ad053e9d5068cd1a3eb4e3831c7cffe3
SHA1: b342f53967e84fa1e9ece1c5bec4ab334601f190
SHA256:58cb51d8882aa04f07bd05f9e9968549a5a13e8fea088137bc12d36d5875d9e7
File Path: C:\Windows\System32\KBDINORI.DLL
MD5: 781964816b3261ab6f6d9cd5e71c2d21
SHA1: b96c74b7ba37fe6bdc91ea3af56d8880c55c02b4
SHA256:6c3af39e6d5e21764bf3df65e59f42e795b5af8c802c477e7c3a5990781190a1
File Path: C:\Windows\System32\KBDINPUN.DLL
MD5: 88cd8f660d5d9286257bcf173c312781
SHA1: 9d0e5144b74a3b3f4df39e31c9add18499288843
SHA256:f3f7e05eeedabea89798719c46cb0e754590bb7209bec9763dae00d642ebf774
File Path: C:\Windows\System32\KBDINTAM.DLL
MD5: 5373631608694e1d299a0f73adab7772
SHA1: e9b7a37b45b78e15db0bf8473357e07524123310
SHA256:e3dc213d74fc5d184eee9c7b8106346e27d811c273ef0d205b88ea93308f57c7
File Path: C:\Windows\System32\KBDINTEL.DLL
MD5: e7a7d96619ba751229b4ae503c0358d8
SHA1: d1ed42c989c4babd2a7ebff20f4f3de7eddf3588
SHA256:5a8ae45d879d2ab4797f54bb1a29d1331489de0fd93774ba30ee08570bdc6445
File Path: C:\Windows\System32\KBDINUK2.DLL
MD5: 0b41c65ab14b7acfa47c6fd426f53ee2
SHA1: e6ed637c7df7281bfc35845838fdc536cdbd0df8
SHA256:5b06a65b6703310df2e59c156f7469904da941cbe072e1866be2f1418cea4462
File Path: C:\Windows\System32\KBDIR.DLL
MD5: 6811753272c029ccc6cffa3d34c43555
SHA1: 810bfe36e716c0f483dfa0968acc82e6117c71e8
SHA256:678d72bc349dc46021eec11c334f7b0fa54f56fa5c5fd67af4dc7003c7088c7f
File Path: C:\Windows\System32\KBDIT.DLL
MD5: cf3fd3cb4c320a8290e77d0ae89cdd7b
SHA1: 59016b7c511d5a34e32b003dba550ce78c1e6929
SHA256:3f6e358ab55e08c01e1994f8d95f7ef18ff67edb8bdd1900ab730a4ce0be539e
File Path: C:\Windows\System32\KBDIT142.DLL
MD5: 2acf6d3586d8a558e4452c98289a54fd
SHA1: 01a1d1f5368b2ceb0b2c16a85f1a53be55a2f21d
SHA256:5624c0031e29abed5602a44afcd6ee2a6be7a158142b225eb0cbb643875214ea
File Path: C:\Windows\System32\KBDIULAT.DLL
MD5: 4c6ca5660ae3fc74aa1b20aede16a1d1
SHA1: 5e460e54e494749efc85015b24b0b4abffb702d0
SHA256:d164ab84aa021a002315d2ca0b711a5ea2d8044b9473b26c218d834449c3920d
File Path: C:\Windows\System32\KBDJAV.DLL
MD5: 21200774b06a003567259331fda6e428
SHA1: f9f73f3baf10300b6b763a2dd138c7bfe1f53f70
SHA256:29868d7e8a63c56edc895ecab19fdb590dfebec87a0b6fd9e174cbe978d660e0
File Path: C:\Windows\System32\KBDJPN.DLL
MD5: df44bca57cc75e7064bec50a78618d03
SHA1: 012b5180c7bfae8b506e413779885951eecaa9e3
SHA256:c9816a26fbfa29b7ac2e1a1784349fe7e5f1b07f563c420486df0d96b97d59e4
File Path: C:\Windows\System32\KBDKAZ.DLL
MD5: ad64963195d50f48c736873e7269b419
SHA1: dd7ddd313bac843fc6e905483e84632b3e74bae1
SHA256:8e8ce1f22db6c19c1079824440d5409f9bac3e43698c83dd015ce2ee4e3063b2
File Path: C:\Windows\System32\KBDKHMR.DLL
MD5: 27769a38dcebde07dd38a2c608948ac7
SHA1: d0fb24fc8a3348d5333ff836b46ae06f5e2438a2
SHA256:ccb80f0e6b2e3800a6576cef6bfe9a8303d204fef51811ceb127e7760f89b696
File Path: C:\Windows\System32\KBDKNI.DLL
MD5: 29fb8b86d231cba1d1e99fa9fd522ec1
SHA1: a419ccd4b6dd1485b274e6c54ae726dfda58fdfd
SHA256:43bcc9c91c192e63ba2bc9a90cf81a9d1e839b4ec3e02b28c6c84f8a63e764ea
File Path: C:\Windows\System32\KBDKOR.DLL
MD5: dc5c272b83b4d9769c87a50ffe662130
SHA1: c79491aaddaf3239b43628e3d3b94baa18caf5df
SHA256:9d73451eed80c7cff7d4a4f796fdc58cf0badc31925b97fd8bf9f27e1e52e173
File Path: C:\Windows\System32\KBDKURD.DLL
MD5: 92b04c858ecff331b38c7c7e9435ccb6
SHA1: b389e96babfc2bd9322ec28f028b92e8fe30789e
SHA256:7907e321d563efe40a0b2fda71e6a82841a0594b2f3e51ce4928ce1e2fdbae9a
File Path: C:\Windows\System32\KBDKYR.DLL
MD5: 636f37494cb0e056c822852ab7330562
SHA1: 230768c17896142fdbe02b1e65d07781efa4012a
SHA256:1e69261170c14b50a3fdb3b91e412fd72e4a0d201724f2af0b87f856effffe88
File Path: C:\Windows\System32\KBDLA.DLL
MD5: 2aa318150bfb6936bdbba50560120d9c
SHA1: 199d660095a4e18a91d5d79431de0d0281153447
SHA256:4f6a3f3369a71938e1baea7a17dfcf7a6e37dd113afd6c52224ffdc5b68df2cf
File Path: C:\Windows\System32\KBDLAO.DLL
MD5: 702f9cd858969bc1cfe3bbd60813e345
SHA1: 45a230618e28a5878fcfca4d90369944507a0002
SHA256:81d7b144bc41e27b2cd1bd2884663d95988a97916aea4a51595b05b0cf65ac74
File Path: C:\Windows\System32\KBDLT.DLL
MD5: cad729c1d90ea0e52b62cad30dd4d3cd
SHA1: 13b6d7fc37be7974b222022bfe2ed93a0741d6f7
SHA256:188b515505300a1e597e10f1c9bb89d170448f8cd506c3cca805d7908803c82e
File Path: C:\Windows\System32\KBDLT1.DLL
MD5: b6bed48e507d54439cdba4acc84f5425
SHA1: 80576abc12d40009e12931b7bc03217e85986b22
SHA256:8ffe6a00a2714440c66945723276f57969f619bf3317c103ce7ac5a6a2ce7022
File Path: C:\Windows\System32\KBDLT2.DLL
MD5: c01d522c82bc486f53870dee236d8168
SHA1: a81660b470f51abc004e556d559c4ed0ab421a92
SHA256:f7ed12d9ace4e2e2ab0fb4bb3d0aaf8100eac5ba29da89a3fd4d506db4eb9c0a
File Path: C:\Windows\System32\KBDLV.DLL
MD5: 912034abf29720930a04db498e3b7862
SHA1: 84d3ad316f57aa8c9f2965504d20eddae4740c6e
SHA256:f2e28ee18cf1a171ed3c46581e6361c79e7a1af5027e5f70209419e072e5d18e
File Path: C:\Windows\System32\KBDLV1.DLL
MD5: a984d0da6be453062eec2a0e2ac107f0
SHA1: 24aaeed6bac0abbb67b4e97eadd8fecacbf96e4a
SHA256:7e6563d86e7751bedc5f5e6bce4bb4fc5375dca4e1c00e67c10aa6fda2021c73
File Path: C:\Windows\System32\KBDLVST.DLL
MD5: 61720c8a784136473e35c109b70d9d11
SHA1: b4c25099e7f2d65e4baf8ae7cca919a78ee6c5f1
SHA256:4fea62dbe090c2f9998963c67f65820be7cd03ae0f0c2413a0fc6b69d8f06113
File Path: C:\Windows\System32\KBDMAC.DLL
MD5: c78d3103a3bd64f514b5b6895ea30464
SHA1: a0ff288f5bb0e5158eaee399c62843dcf9d6f6c0
SHA256:fc618771cb9f6c6019bf3b86ae89a0b0c741483000bf7b4fb9ba5f4285a86bf3
File Path: C:\Windows\System32\KBDMACST.DLL
MD5: 59c5f787ed213c73e7564cf979cd0491
SHA1: 7145677aa1566301bd1a6d0d27ff992486763674
SHA256:91f673bf9050d3dc94d488af5f2fc8246142bbd0c9ac143de126694673d22f67
File Path: C:\Windows\System32\KBDMAORI.DLL
MD5: df4871954d79a3587883faf61d620206
SHA1: 50495e0a5da02eac548d68975dc0534a81402caf
SHA256:6b57998c2202054c45f10ba780bc887b61f01a7257016426b9f88726a618629b
File Path: C:\Windows\System32\KBDMLT47.DLL
MD5: 3cdab750c80b74885da7814545573af3
SHA1: 01a2268f518c93f5a48e2949c619ecf60ed19f50
SHA256:a5efe34748a6fc32ad957530604f6ba2a01da4b6a74197e69d08170ad73d1234
File Path: C:\Windows\System32\KBDMLT48.DLL
MD5: 59475c031c070c01a990d247e8592e5b
SHA1: a4b17ee4ee4be645ec9501a001fd172bb08817f2
SHA256:450b422ed413bab06f173183d2df057b28060664a366a7e504d60bf379f958ab
File Path: C:\Windows\System32\KBDMON.DLL
MD5: 01f90f795ef14b6b6693905578b203e0
SHA1: 95a1e08e36a99a5d0923462335bf7a54f4f840b7
SHA256:80f4fd311aaeebfb7efcb6e7a462690f1bd669cc2c64efe724d854820666e9a9
File Path: C:\Windows\System32\KBDMONMO.DLL
MD5: ec59fa49bbb90d02a4ea56304cc9ae83
SHA1: 0e9b040a721e5fc0e67fc77c4ab57d3fb5c29361
SHA256:470925cb2d28cac80eb9ceaf63b409e1815c307127ea10cd8b8a2797e15fa47d
File Path: C:\Windows\System32\KBDMONST.DLL
MD5: 19331f9d72816247db4ea033b73ec95a
SHA1: a96e31e7cc2c6a0b0d1532660d715d257b7bbf4d
SHA256:e7182008b8f225a22de57288a679bc21b527032963bf8d63b2b9fbefd8651204
File Path: C:\Windows\System32\KBDMYAN.DLL
MD5: e5c3bdf360993b367653b18583607166
SHA1: c1f6b3a6d6e8e7606a12850de6924bf39c8c13ca
SHA256:292474fb6f38627a9c94257c055638744cc35326d5d9f44c6b9cd77300494263
File Path: C:\Windows\System32\KBDNE.DLL
MD5: a69da340c8dbb87aff2506a8f4231401
SHA1: 937d3ca2b3387c3be526ed57db61b0ae5a62dd6c
SHA256:da3fcc069a9ee56095bd0ae58baca5a6eb12e6e92a5b89a7c4ecf7291d7dac63
File Path: C:\Windows\System32\KBDNEPR.DLL
MD5: d2646bdf7cfc141d676d28670cf28fc1
SHA1: cb8af26ed3c540d39f1bd168e8abe1eece9fedc5
SHA256:033355ff7fd2f3b53d61f737333504d5c3a0efdce0c4fd8c6259543f0f53dc70
File Path: C:\Windows\System32\KBDNO.DLL
MD5: fd4447b5100067e1c92db93db1910629
SHA1: d41633c2c7661bce87f4c30f66045e299967f4c5
SHA256:309099d35f357a149d1c805cb8509e5d4999fd2ca71fd58352860b5fd2eb6c45
File Path: C:\Windows\System32\KBDNO1.DLL
MD5: f8ee4c9dbdd6ebc154bbc953c04d2f92
SHA1: fc1b82b9fb9a07ed0c9333e27f30e90ef0a4e819
SHA256:e030da0e92bad2fb8900f22f47294b3f5efc07d6662e8cc7c4c93cd6adfc70b6
File Path: C:\Windows\System32\KBDNSO.DLL
MD5: e4d6e61f0c14c2cf0cd4dd1c09720f43
SHA1: 234957de09fff6d3dcfac16411a25014e6f0e46d
SHA256:28d1acaad99b2186bf9d6ec9ee53dacb33e7c153a597396f97c681d5ead00167
File Path: C:\Windows\System32\KBDNTL.DLL
MD5: c2271689ad875f22b2f2780f2d7deaa2
SHA1: 54a473546554b6c2033bf93b23b80829934e8f8b
SHA256:a55701337cc014dc703126c582705985741fc19769f7c5c2c5c986ae0becd34b
File Path: C:\Windows\System32\KBDOGHAM.DLL
MD5: 7180a99b442d347825a9d0465335f414
SHA1: ff3f0c6870cfebbec5ef0f4d0959ab5bb938c284
SHA256:aaf9df4c272caf7b3660434b3f304a2aa22db8d3071aab7c3efec13b450f7917
File Path: C:\Windows\System32\KBDOLCH.DLL
MD5: 06ae9dd9f949b722a87b14ec67d9cb7c
SHA1: 04220ad6f5a544d3fe0343bb0db08d1c37e0e29c
SHA256:ca8b1e6679e2703ab41c2e53506e5c1e59e97d69598f804e09d0ec5c68deb041
File Path: C:\Windows\System32\KBDOLDIT.DLL
MD5: f55c424d0f0ff365e7b119b92453a726
SHA1: 7a62eab418396a3626b6076e99c5e8098a039115
SHA256:7306ed2c4cb412f4d3a795143b5fa0b02af105571ff7b5a9a6d139be5c66ec2d
File Path: C:\Windows\System32\KBDOSA.DLL
MD5: e1265cb4f193da172e9e14e85a025080
SHA1: e184b73aca1171b56ee100952e7e793be972d0d9
SHA256:44b4f39dd192e9998115f628cfe993847537932cac41d86c7861c9231e52fbfe
File Path: C:\Windows\System32\KBDOSM.DLL
MD5: f09099ea1121062cb4e80319cf0c0808
SHA1: f75b0ae88c9ee28786a3002551e846c3e41ca03c
SHA256:f19bf1f7de1d7abffd39cf713237c6a6227c6712967181ba4d9bf290b42b3876
File Path: C:\Windows\System32\KBDPASH.DLL
MD5: b7c5fb67bf2bcd52b3cd39207f4a1429
SHA1: 2972ce966ba6dcf4d3005eef21ef05e5d5697ced
SHA256:b074b944b94261796f62ae8392a608626a1468ff5aff1c06ac522e90f856c6c2
File Path: C:\Windows\System32\KBDPL.DLL
MD5: 8c695079372be09d0913a045045c6e5c
SHA1: 0e45e64071dbab5b15941450088e37512ea17d87
SHA256:7de72d50eaab5fcb93354a86478c8fade9541a8b57a86bc5c0b7a0f7c67cc62c
File Path: C:\Windows\System32\KBDPL1.DLL
MD5: 716e5ca52c9145c771c4fc48083795dc
SHA1: aa8878ef4d55078ea47528b92e39f1f348af2c9d
SHA256:cf39dcbb7eff4d4695629e095e19f9b75b4473ec433c123cce499f98553320db
File Path: C:\Windows\System32\KBDPO.DLL
MD5: 28ed461432a4bd5f28092b640853f331
SHA1: 38e19bcdb8905deb0b095cff8a81b5b04dcf0cb4
SHA256:f26b89edfe68e7da6fac12b0237a379c5a4987afa3dbd5f22c2d6f633c293090
File Path: C:\Windows\System32\KBDRO.DLL
MD5: 9dbc215a9c999dbc35afe0169afb8493
SHA1: e6db83e62432038581806a0235d40cf51e5801b3
SHA256:7e922ee3d2caf150b89d3ac45aa55e2252901f8d5b941c1c989a5ba1a1bdbe59
File Path: C:\Windows\System32\KBDROPR.DLL
MD5: 9aec9fb42014ea5d07bc4786a9a27281
SHA1: 50652006f90f7c554a632e43a4c642a608f2c4fd
SHA256:144253efe0bf6ba522f849b7e357eaaec9758ee40fda499e3ceeb4ac783732f1
File Path: C:\Windows\System32\KBDROST.DLL
MD5: 5611e1d7cf5ac212ae4486f4b4cb26d5
SHA1: 23271a38b73fd63d5bf146e333448071041989b3
SHA256:eaeab99b122efa7747080043e14813fa07d0167c381776935b3c78fd675633da
File Path: C:\Windows\System32\KBDRU.DLL
MD5: 6ac0a85a03cab398fda640434a5baadc
SHA1: 3f53fd84e5309a68340cded303f4e7a77e209bee
SHA256:7a1a2c2a79d67c9b3495e3f814b0a4ba1344347d072538e17ff7a7c3d3ce36ae
File Path: C:\Windows\System32\KBDRU1.DLL
MD5: db958bde5b185fc6d965fc12be399b3f
SHA1: a4ae792d19d3c858aab6c9818033e31a845e07f3
SHA256:fc6319eef456cf785b2d61229af822f4714e21037d04c83ba764038df26b10b4
File Path: C:\Windows\System32\KBDRUM.DLL
MD5: 69dab6034b0d2845d4d08b2834f74084
SHA1: ed32ec1d69fbedd1aca7dce8072c029316258ef7
SHA256:4cc4b9d7ae0631965e9f48d51cc74238d05befe7df93ea959c8653048fdee431
File Path: C:\Windows\System32\KBDSF.DLL
MD5: 104d67d139074a7db183dfcafe057e02
SHA1: 72ddecd36c08f4a78810ae9549b69e828920dee7
SHA256:6f653f1b295744d259405dbaa9edf8e22d6b2dace10e1294c31fd22389a4dc68
File Path: C:\Windows\System32\KBDSG.DLL
MD5: 305be129d7c5122d27e95064d2209988
SHA1: 9db33ca114bea42890e33c01ac654fc18937eb92
SHA256:c5edb4f36ee956d6c7651eaf782035bf98bbcff7a732b084d555e3536a01421a
File Path: C:\Windows\System32\KBDSL.DLL
MD5: 0a0ee8c4bb5e6624947db33a542a81ac
SHA1: 946e9a3b843b4cceddf5799de9988c82abf7d0f1
SHA256:db87f752b9ed9f98731c093378eb2e24e55f562e28fd0cab4cec8140ba85a35e
File Path: C:\Windows\System32\KBDSL1.DLL
MD5: e5f04f37ce5bbfb8f7553ca4e4e7caa9
SHA1: 03b184b0b8838388a3dd613eb40caa723e5028d2
SHA256:4baf24a9a9eaa236424b8471b61beac795da6703342581d41bfa6418d89f8aa3
File Path: C:\Windows\System32\KBDSMSFI.DLL
MD5: fc09d7979cd5dcdb44d4610f3a6875a8
SHA1: d751186fe9e31fa50513ebf7a5a3b8e9b18e6ab3
SHA256:e127672cab2106fc6824de233daf056142d889a7323779fd871ea9b41e7477cd
File Path: C:\Windows\System32\KBDSMSNO.DLL
MD5: f202bd44adbdcfe7b17038241d8079b0
SHA1: 02503ce741441c9f8769d8cb1712e12df4cd771f
SHA256:6095da5141c3e1b40ce5a0e997473855272b1c69886d5eca810f471a7990fb66
File Path: C:\Windows\System32\KBDSN1.DLL
MD5: 4ff242ac2f02cddc4c375250172ce33c
SHA1: 7d5f70b800c698bae96575149728964f7820ccd8
SHA256:6762b2fb66218ddff6471ccdd035e8eea2c382fee7e33d305ed8dd70a8f7039d
File Path: C:\Windows\System32\KBDSORA.DLL
MD5: f2303e442ca4acd440dc358f27fb9a7a
SHA1: cd40b57573ba2aa772422e754cf601efb8490f12
SHA256:536fe53b1221843494b9a8fada275acf9a82893f240ddfb8ead91d38a057dfbf
File Path: C:\Windows\System32\KBDSOREX.DLL
MD5: 9b347b91ce0ee9bb4d7645083c2e96fc
SHA1: 74ee04c0d49fe476fcb7b759f0b312122700e532
SHA256:82d3eb978d895823369e82fad687111548b22b50aa5d827364883404d41e9591
File Path: C:\Windows\System32\KBDSORS1.DLL
MD5: 421f35c98c4bcd072adc8ca3b83a3e22
SHA1: 1ddd64964e2864315588a2cda7ea870836578104
SHA256:6937c1c2fd233499431a30fee13cfb1b787c9f220bdb96f59e0f6a1f8d6b8844
File Path: C:\Windows\System32\KBDSORST.DLL
MD5: b37f28aa8959c39027956d4a7127f07c
SHA1: 0619392445f0244063a33e20bc5ac3a929710327
SHA256:31495a1b2c39c2f35bb02fba5f5d51bf3b501e2ba86c3f692234446371d928b6
File Path: C:\Windows\System32\KBDSP.DLL
MD5: c65d5c66273b956daceabe593a67237d
SHA1: bb430f0e151f1afe860f789c1e0a453806a05ee9
SHA256:43cb429dbe27652e7ca0d8450c535743ca6f4be7c5b29e1f3ba9037eba797bfd
File Path: C:\Windows\System32\KBDSW.DLL
MD5: 0152deafe54e9c8dd77ffb0359d8c1f0
SHA1: bfb07484389b4fc4686227f2c6c7965cd7a8da05
SHA256:f6eab67373be3f1af7cbd7ee13d6dcfeff7bdaa8bdea0f651e51cbfde1da49c2
File Path: C:\Windows\System32\KBDSW09.DLL
MD5: 9aa504bfb544f63bdea2169e67fcb453
SHA1: de23e48d1f2fe7f968e4ac775420eee76f94b1d0
SHA256:ca6c2a9cb93d4614a426221400db87bf4db993661b7dc2ea9fa1b0fbac9139a1
File Path: C:\Windows\System32\KBDSYR1.DLL
MD5: 85fba024ba56f2527b04e61e73f5e69e
SHA1: 237385408e2261075f82a1a0e80a1adb7c748b40
SHA256:0c7a7c514401cfdd98c843bf3022695c99caec4f1673cbaafd90bdafba857b84
File Path: C:\Windows\System32\KBDSYR2.DLL
MD5: 931b879ad4998215734f9c1a1564025c
SHA1: a20a361011d4d19131e58ce3082ef94853f84ed5
SHA256:7b916d98facb92e0141dc8ad2da2a8cc53d7487e179361f3cdbd802a6cc2a1db
File Path: C:\Windows\System32\KBDTAILE.DLL
MD5: d9d85539e52954fb02c9cd5f9041d6c9
SHA1: 35c570581c5953e1b7957f521c82eae237a516ab
SHA256:2a0852faec0706fcf34b5cbd17c5712e56e0a0abaa91723ced6ff574cba94814
File Path: C:\Windows\System32\KBDTAJIK.DLL
MD5: 014d80cbf597c04a3043efe98ab8af37
SHA1: f88ddbe0c84db40298b9b543911cf614579e131f
SHA256:d8117f27d286003ce00f00d8710f76cb14409a3ca981d55777f3f940ec63faf6
File Path: C:\Windows\System32\KBDTAM99.DLL
MD5: ccc736781cf4a49f42cd07c703b3a18b
SHA1: 6ad817d7e8b7e9dc978763305a4cd4f1ab9abb66
SHA256:000c4b5b50966634df58078511794f83690d693fccf2aca5c970c20981b29556
File Path: C:\Windows\System32\KBDTAT.DLL
MD5: 5039a51567fc77a04ca406ad9017def4
SHA1: 711f00935365d9eb8d3ee7813519a2570a6840de
SHA256:73b556fd8226ba12a1eafeca30653c3df968ea2424f4bc112f41ced3563b071c
File Path: C:\Windows\System32\KBDTH0.DLL
MD5: d9df38edc22b9c4180917b6f5c6dc429
SHA1: 276410fdf8a3215fe21d88fd1f10a0cd056f0b62
SHA256:61ac624aae7f02ba1ac57e9825167f4c11b21ebec206c72ece1ef215634d6174
File Path: C:\Windows\System32\KBDTH1.DLL
MD5: af01a035885696a1f03347c0b47329a0
SHA1: db37ca6073c13a9b0857618c5c26b4f4f3e1a295
SHA256:83030d88d4ab7b70d6e716f95b88058d401a19b973428cd476d6086046f80358
File Path: C:\Windows\System32\KBDTH2.DLL
MD5: 6b3dfef18beee10a164ba472b45e4f7f
SHA1: 0e2b118923cbe78b2ec80c2f59e44f2c18fe2af8
SHA256:d734f35cb3df63a97e9e1d5e4197806218723bb4ddca0aa3fa9e6fc1f20afd98
File Path: C:\Windows\System32\KBDTH3.DLL
MD5: 25f92bcb15df0f1f64584cf081bfec2a
SHA1: 221de42791e9ad68dafc41d1d8e458f9aa111b1c
SHA256:ef5af93eaff0499264ab0fe9814d546c2f8b18c1bd25ea1a4e43b4c65d9cfa75
File Path: C:\Windows\System32\KBDTIFI.DLL
MD5: b717087d3822f8500b232e4e0f25928e
SHA1: 77b282303a508c9cc4aae067d34b733bd53ce2fb
SHA256:6d0761f4d13dd7250cdc0fb5e5b347251a75138b2177a48f21905930b599bc0a
File Path: C:\Windows\System32\KBDTIFI2.DLL
MD5: a6d264f30ac2949d24770f9f666ff278
SHA1: c10add3e906ae46538db033ff4142676ce7652fa
SHA256:6d6501abe4bfba48029b47229c729d871ef3b57b55a99f7f9cea927bee679dad
File Path: C:\Windows\System32\KBDTIPRC.DLL
MD5: 597d58891399ad701bad67ca0bd343d2
SHA1: bf511fbd824090c991625c67d9a469edb22281b3
SHA256:469468037bca5a2501fde2edf1cc102c25a29b506ca3ebb03b175bba9a97b6b0
File Path: C:\Windows\System32\KBDTIPRD.DLL
MD5: 9142f44de38d19c4d2d2b1da4bb4ac08
SHA1: dd35916dee14055abecbe14cf8f740049037d721
SHA256:ac883141c546cdb33d0503573ab1504a20964dc0dc3f5c312031998716cddb6e
File Path: C:\Windows\System32\KBDTT102.DLL
MD5: 52c1f6f74f32e8bc9a545814cd028499
SHA1: 54568ec9ddc00026c61f97c740542de3bf9d45bd
SHA256:e2848f23a23497647aca71f52dfc68fc14c732fcfdcc885bb5fde820f4988676
File Path: C:\Windows\System32\KBDTUF.DLL
MD5: 93d4b51901d6b6721d1769c8237b7fd5
SHA1: 45a167f241bbdbca84b6f61f8b2a7b4e633efda9
SHA256:cd70b6e1ca4ffcd3a565be5fbff80f8dc205f9e903b746ad460b5b3b30979ff1
File Path: C:\Windows\System32\KBDTUQ.DLL
MD5: 7bcf3a8d00213133752806027e1c27ca
SHA1: 66c0d0647fe9e990583b07c188e7db356b7f7f30
SHA256:143a2dffffb488799ebfdbd49e1f6e0f698d9973e6d09dc644d223a0ff7b0254
File Path: C:\Windows\System32\KBDTURME.DLL
MD5: f3b80643f63d1b482be6f99947b66015
SHA1: f99f66d827fa033b6ccbd5f8ca273ff418b58612
SHA256:2d7390ce2b93573dc8f37ef4dc45516d74f730d41af61d5aa83740b21e31356e
File Path: C:\Windows\System32\KBDTZM.DLL
MD5: cafaabd1f38c719580c056a2373f0534
SHA1: ea6e5356677bdf295eeb6e25be96900f50920c71
SHA256:30976a88ca57b8c7c16bff37313fbddf1c0a5482dc2d273eb42cfa7c260af9b4
File Path: C:\Windows\System32\KBDUGHR.DLL
MD5: ee600de6e3e09406a4627cc8a0255148
SHA1: 026fe77cca565425886e7f582931999e5ac986a1
SHA256:7dd3cf958e0b992a3ae632fadf8a60390f3fe56a2abce8909b020eb4557b4f4b
File Path: C:\Windows\System32\KBDUGHR1.DLL
MD5: 040eda5c76b9b1af41f69df4bfdd7465
SHA1: b33a01f9833adf0a9c24c3d020ff1d8574b656a7
SHA256:7c29bdb6a259e268a719e7163a95d437ce24e32a7ac8987fbafbf57b2e398ca0
File Path: C:\Windows\System32\KBDUK.DLL
MD5: d27372235bdc19ad65b79d36ec56b9ba
SHA1: 11b32ba2236ecfa1d0e41257f333e6faf7f01183
SHA256:b5060ad8f694241692eb268df1be08d0e4fa70ec5e48fb8c9664e65acbaae064
File Path: C:\Windows\System32\KBDUKX.DLL
MD5: 592c735842f988f32b7dcbe0116de9f1
SHA1: 7625effad9ab8e7162050d4716efe6394e7fd091
SHA256:f28aa2e41c4fe10415d8a575659df90231c76164224f740093fbf1cfca898932
File Path: C:\Windows\System32\KBDUR.DLL
MD5: 622290d9a35b442e9468d50d3d87c727
SHA1: 3bab1b1d7bc40aaf8be3d38befbf6761c4cfacd5
SHA256:ef801f5579d568e4e0f91eaed217e3e130f886a9bf988d50c2692295b6e628ba
File Path: C:\Windows\System32\KBDUR1.DLL
MD5: 2adf51029a8964c7afde8689b137c523
SHA1: 499a651e4027d648392007d143f1870f33f5ed28
SHA256:91982601a02128f8d618815d6ec67e9c108b283c984dade3a8f4bb1d30d1c731
File Path: C:\Windows\System32\KBDURDU.DLL
MD5: a60a7a452a2ab58196af852ccb12a1e5
SHA1: b645c308239935a644e748d11110dc6eb0924dbb
SHA256:cf2e9da398ad515b234877ac1bac52a8e232ccae539e39adc9f1fd43f21e8520
File Path: C:\Windows\System32\KBDUS.DLL
MD5: a55c554e754c7d6feee30613017f1858
SHA1: aaf7e995e3c548ee591ea990056900b9fd83c7db
SHA256:49e76f6e8f0e3ac1806a3c1b8ff895492abae29e10885911ff2e2d14b6d733d9
File Path: C:\Windows\System32\KBDUSA.DLL
MD5: b0c02601c2fb385c2d7778c81624f5ee
SHA1: d8fed9e226a59c89b91b0f16a31b084c2e0e63d0
SHA256:384cb7ae36364ed03549f58af15c517366cdff0fac0a558f1072fcc07e840ae8
File Path: C:\Windows\System32\KBDUSL.DLL
MD5: 1fb4c9e109c339170b74b5cd6b9ac1d9
SHA1: 157c2add8d53c0f1e66511802960ed64de64ca8b
SHA256:872723ce258c91085f35076b457eadad3adcaf9aa3e35d280f2de5d2803e96c4
File Path: C:\Windows\System32\KBDUSR.DLL
MD5: 18866dfc8b92c49ff6de0f6fe8498e31
SHA1: faafe206d6d57276c4fe5ddef6faa628576e769f
SHA256:c34580f59f7f4144054f0ca966c16b0bd0352c7066b750301a6f799d9614d39e
File Path: C:\Windows\System32\KBDUSX.DLL
MD5: d4941f954a0891d9bd861fb9805acd0a
SHA1: 86c9d6b811885f8ec41a43bc5874d3f8426fa945
SHA256:58b52ae38a45f7742e4c06e7618ab3f305688efc54b7fe2c88a66814f5431d7a
File Path: C:\Windows\System32\KBDUZB.DLL
MD5: 084e58239378de9dcc6603f6ea0e670f
SHA1: 01133240b05d25faf6574f0a8bb2629b0ec840f2
SHA256:d9fe926d25213f2e1e5b87e7255fab6e102dbfbe28675eb0f10c42230ef9da8d
File Path: C:\Windows\System32\KBDVNTC.DLL
MD5: 7b67f52f7958614115f7485d405b2269
SHA1: 6c00330b615480ccdde736f24b7c0c36f5818033
SHA256:042f98d42331e4faf406840956aad2d540e7ed423dbc9b0e3fb1e13efbd06aa2
File Path: C:\Windows\System32\KBDWOL.DLL
MD5: 2ffaaaa64c4f08d1da8371c98bab1f78
SHA1: bb4b3714adfa5897fed085fe28ad898f630642e2
SHA256:fa26a8f93cd9e0fc1d75c533ab978fa9667157f18806b9c233edea67a895e4fe
File Path: C:\Windows\System32\KBDYAK.DLL
MD5: 0203af79a583d465bc77cd8d085feade
SHA1: fec9017c9e7b21675b2dddb8961721a723ab6b25
SHA256:66d9ac7ea0e7f6525e86dc9955f3131b33a064ba3ad5c37c808fcc0162f0e05e
File Path: C:\Windows\System32\KBDYBA.DLL
MD5: 3144e4eb062bcd2f15279d3227136f0c
SHA1: bc6edf7ffff5ebf1114427f5ea3eb654d640fc9e
SHA256:54c11a1c4c28a2426210cc844a2f7b9b2c2d1b893e0a6a76236f468079c7dd68
File Path: C:\Windows\System32\KBDYCC.DLL
MD5: 2f74dd89d7a6e3ae0856c83f9c3a920e
SHA1: 5ff262e49935c3c6a470aac6b139d3e8dc08688c
SHA256:e43cb7ff42b604c427112429ace2b5911e7a3a05c86fbe2de3dfa266a1af807f
File Path: C:\Windows\System32\KBDYCL.DLL
MD5: 8aaa355128ece2653db0ea56ee20ae9d
SHA1: b37a76da7e774dc2412c16c4ef36fc88bc53e9a2
SHA256:33688366fc2342292ed3f3287a5b8a591ee442c349e9d7ec91855966f7071f98
File Path: C:\Windows\System32\KdsCli.dll
MD5: f08351592a46f2df91cd58d95f5fd104
SHA1: b313bfcd48aaa1243eaeb3a6780f6d68a66d76ad
SHA256:af1aa0a99ce301976eb1e1fd4fbecb0ed6afe54127b860c7d8f5ddd9c0d9c3aa
File Path: C:\Windows\System32\KerbClientShared.dll
MD5: d1a07399e84380637f6a4adef75fb5f1
SHA1: de6650bf7e345ea0897f9a4d39708d3fb64f6de4
SHA256:82cceeec74b444b8eef3ed709b22b3735d841425c7622dd0726e904befbe0e51
File Path: C:\Windows\System32\KernelBase.dll
MD5: ec2f71780fb0d2335f988904cf9a01a7
SHA1: 2fca70f331d9cb71f8052178c14ad05f786a0160
SHA256:a5ca39c8dbf3997b94a6a005d308bcf927bcb1ab5bfc9a7414075fab3f54d241
File Path: C:\Windows\System32\DiagSvcs\KernelTraceControl.dll
MD5: 34169bfbf30a172c8f95257d124d8ab6
SHA1: 900914cf5684c221f45b04c6c530bfd4f6e2a768
SHA256:3fcb71ac01f01701049cf4d90cfa21b6e49c965b8544dcf00c204f10f1740acc
File Path: C:\Windows\System32\KeyCredMgr.dll
MD5: edccf328ae472870e415f3295c3ef8be
SHA1: 389ad61233e49598fe0945e347ccf6ca3adcd918
SHA256:8418185247bf286a5c91de2ca8ad821f7ab34d567c17cea0a6252260b87aa730
File Path: C:\Windows\System32\KeyboardFilterCore.dll
MD5: 5d616a974e3fe74c6ae4659820b764d4
SHA1: aa929794f92c01dd587b44512cadf4a63a8885a7
SHA256:c8941e43af8c5acea1f40e87ff4bdaf29a07472f2e3eba262ba80aa82752e2c1
File Path: C:\Windows\System32\KeyboardFilterManager.dll
MD5: 032ca127cfb151d5f705708f8c657955
SHA1: 3224b5fcb54bdde399b8b2d18310fed55808e2e7
SHA256:be2e51f533ca77890a81783b41e59ec3453d8b675784f754abc222b228e88a97
File Path: C:\Windows\System32\KeyboardFilterShim.dll
MD5: bc58ff8e40d259ba11fe691fb807b39a
SHA1: f890074e036ec52e894a3c8ecfbe74e99435c9b8
SHA256:d455c0a6dc8e8d24334b441fd49321d2244c1b1dfa2a8d4f3200f51ece372b6f
File Path: C:\Windows\System32\KeyboardFilterSvc.dll
MD5: 2dede58c05bd1576af8b21d68a82ebdc
SHA1: 1bf12a1e971be4cf5895c47f8ce9ec955d0a7c38
SHA256:95607fe3ff4739e4f15551b157dc01fc2ab3cb1a5e286102ec210b979d1b73af
File Path: C:\Windows\System32\KeywordDetectorMsftSidAdapter.dll
MD5: dcc81c03434ba2f5dfd0c9377abb420a
SHA1: 51139fb0f0e180467b3b04b371f6ecc4f59d15a5
SHA256:bd3601d477e4b123c3d6bcf2862be37c5f66ac99517a4c63a1eec3d9cd729552
File Path: C:\Windows\System32\KnobsCore.dll
MD5: ee50dedb3d460f9e94622a596be0fda6
SHA1: d157083c2d02ba2c9b06dfce0bde48c5e0ae59fc
SHA256:1ec8812decd5c8ba8aa7a02f6115a20ba8b4e4d31806b310b72f7889f8925908
File Path: C:\Windows\System32\KnobsCsp.dll
MD5: 873a7b0f7fa6942d553d1f7fa9132783
SHA1: c0127f1ef5a9a0cb12107290b3b82d0654feae4d
SHA256:b96b1ac1cac0c15606a2c774e893edeec485bc2373b1febc0fbd4b0c73613d1d
File Path: C:\Windows\System32\wbem\KrnlProv.dll
MD5: aa9abf2460db5c2102395c15a60500b6
SHA1: d89a377cd86d14df1675ee6d7b65db4a5eef9eda
SHA256:624ea5c19fffc1634e387b1ea7ec1337e903a6edf4a5b2071494c3bda5329987
File Path: C:\Windows\System32\L2SecHC.dll
MD5: 7a8ce268029654c7c91f1757e98526c4
SHA1: 65b1b3593b2dcebecbc8e40fe59167fc9f0f00dc
SHA256:44b1b2f961e73b5a02e6bde9c752ce0f8caa849951877499a77dfc84f10b8dca
File Path: C:\Windows\System32\LAPRXY.DLL
MD5: d7edf5e3f30b89ac95e29b4071ce340e
SHA1: 0baab06294d90e4fd64e9b964ae915649161f1d1
SHA256:fcea47c0acd7bc9eec4b93f47f2d8130bab5380b18c0121b0c4916340afc73af
File Path: C:\Windows\System32\DriverStore\FileRepository\lms.inf_amd64_a55aa2cd52a3429d\LMS.exe
MD5: 52de371c83ca88e4d279b082d992da7f
SHA1: 03eec651e1e63784819de6f8f6e91ce0bb0a25c7
SHA256:93872e5d2a14350a48bb8d987257ec06a7e1ba791cf5c999253c13a48cac6b94
File Path: C:\Windows\System32\DriverStore\FileRepository\lms.inf_amd64_fddb643595e0b8d0\LMS.exe
MD5: 3ea726927781374110a7176dc0640838
SHA1: 3f41264178761709cc6ebca7c466489603015f39
SHA256:4b51bb1708809fc435c164323ef29342f2500ac135c69e2f312b0f5475a9fa02
File Path: C:\Windows\System32\LSCSHostPolicy.dll
MD5: 63f79a999b2944a26b527c19ce215866
SHA1: 21e6dd7ce9bbdb11c302124839652e1c6d033513
SHA256:e2ab1970fb2042f26d3b56789351f8ac32a5c37a9c022ccce6912591a72c0d3f
File Path: C:\Windows\System32\LangCleanupSysprepAction.dll
MD5: 4d87c35902db703a6ddc4b8c242925d4
SHA1: e79b1d411492c1271387a21bf289ed5afe94ccad
SHA256:becb638a4489fe11bf9e7de93365e76cd08a7d718bfc572fd5b7d09f0fc63fe1
File Path: C:\Windows\System32\LanguageComponentsInstaller.dll
MD5: 9a6a86eaea7e48fb59612cd43e8c1387
SHA1: dc777970ceffa85b3c853f6e485f871b18c363c5
SHA256:2e1e187a8b244e25b6001017fccd38ed87dc4fcf345ee5f959c791440c5e9005
File Path: C:\Windows\System32\LanguageComponentsInstallerComHandler.exe
MD5: bd530f0d3232c93af7e5f303aca18ed0
SHA1: eb71eede249622d0832b01a36b456b5de385d840
SHA256:1513d512ab83247d6878e5ebdd75a7f198dc95954b2ddb80f82deec611ce4ac4
File Path: C:\Windows\System32\LanguageOverlayServer.dll
MD5: 3b96e441552c94157822dd147ec009e5
SHA1: dccad2064e55aff792d710743cb7a136cf7469c1
SHA256:c556713ddaf0f2fc1575eadf929c6312f6cf419b3716a616838e270e17d43d8d
File Path: C:\Windows\System32\LanguageOverlayUtil.dll
MD5: 64100c3b5c8144dfbc023a66f3bf363e
SHA1: c319430534f843157ee3a450fe3bd91c192a7162
SHA256:2ee9111c9fccd5e91bc3ec9e164142734ed8402efa068ac8085768f0f3499ac2
File Path: C:\Windows\System32\LanguagePackDiskCleanup.dll
MD5: 0b53463102e15b9e3cef97ae4bfea589
SHA1: deb00e3688f863857f11221b1c38270764a8d033
SHA256:c8ca8fa5f9ae7d9da028913ea6a2e3b9910fd2404fa626cc0443c9f082487501
File Path: C:\Windows\System32\LanguagePackManagementCSP.dll
MD5: 1131e376486dd145e1b966761598cd6d
SHA1: f4dd0457d5b26ac55ac3041926aa2952faa463f2
SHA256:ea2316210f962675885c8e7b35d9e04018ab5a5f532e65f841d5814bc20c181f
File Path: C:\Windows\System32\LaunchTM.exe
MD5: de9895e1b39c9c4f1122b594f0b4ae1d
SHA1: 582c75071a898a898b5579de3ffdf61db9677092
SHA256:ab0a8a1eff0b4bfaa3d44963bf9226bde4fe3c6a23cdbfdf45336b765aed9ea6
File Path: C:\Windows\System32\LaunchWinApp.exe
MD5: 260e0b3e5dad37ecdf3cd2a245bfd6dc
SHA1: 9939ad80e2351c14604163920758f20778f4c808
SHA256:e041112637eab3ea5af27fcfe190f1c9acf1ce243217d26bd7c3e86fe906fe1a
File Path: C:\Windows\System32\LegacyNetUX.dll
MD5: 00fbdb4562c133055d455f0d3b95d433
SHA1: 4b5e5bb112461c9a6958563a33ded006efadd943
SHA256:ad8a16f0fe5520f8e313cd3e8f0b8ccb1218dfd14c17eb05b8c0a49a49416f7c
File Path: C:\Windows\System32\LegacyNetUXHost.exe
MD5: ec16881955a27bd42d10de190480762b
SHA1: a75197125f0ed85a13b6a5acfbd64c3b8037909d
SHA256:9a3b586c7e626221aa36690fa8aeaba12df19edb2bb2fe8cd2f8442dd4876284
File Path: C:\Windows\System32\LegacySystemSettings.dll
MD5: 88c61024189b64fe7d80531e2c00e642
SHA1: a6c6127356f8fb9f7ff6b852ebe7d3e4ee5690d2
SHA256:60fedf768d8d7ebcc56610e6a99317ac2d674d94b57890bbb7289e9f5ca3b73b
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_01d078da8c0f4900\Lenovo.AssemblyValidation.Native.dll
MD5: 4d8cd02da58868a47dd4533aaa091d44
SHA1: 6eb26d4925e35f692aa497ad645f72373734a82c
SHA256:658806998c2a47cf7fe71ef8258725f3dd49637cf2ae38e0917c6570fe045bb1
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\Lenovo.AssemblyValidation.Native.dll
MD5: 1e8cbdeb6bdfce89dfff3674ffe6a64e
SHA1: f294904ca2bcd1373c5f04652f4fa1e179b5e287
SHA256:0ca54d7ebab83929d2045d30ffaed608955edbb380e1263ce08a17edda6dc18c
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_fdde6ecd49c3a98b\Lenovo.AssemblyValidation.Native.dll
MD5: 33c7090bb8954bbfaa3ee6edfff14200
SHA1: baae09a3751f856950ac4ce57371dfecd460202c
SHA256:5baffc13f8c1edfc22f5a908e432aed52fad83a62ad505a55d6b913994df888b
Description:
Lenovo.Vantage.AddinInterface
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\Lenovo.Vantage.AddinInterface.dll
MD5: 54f414643f52bc4172ab82628684edbb
SHA1: a3bcee9c9b85f7e04adeaefd1741f5b82360bc17
SHA256:9b24e6720dd72d7f5277bdd9f3c9acbe1a5e6062dd6fc8e857b9f37ce33eee6c
A privilege escalation vulnerability was reported in LenovoBatteryGaugePackage for Lenovo System Interface Foundation bundled in Lenovo Vantage prior to version 10.2003.10.0 that could allow an authenticated user to execute code with elevated privileges.CWE-269 Improper Privilege Management, CWE-428 Unquoted Search Path or Element
Vulnerable Software & Versions:
A privilege escalation vulnerability was reported in Lenovo Vantage that could allow a local attacker to bypass integrity checks and execute arbitrary code with elevated privileges.CWE-295 Improper Certificate Validation
Vulnerable Software & Versions:
A privilege escalation vulnerability was reported in Lenovo Vantage that could allow a local attacker with physical access to impersonate Lenovo Vantage Service and execute arbitrary code with elevated privileges.CWE-290 Authentication Bypass by Spoofing
Vulnerable Software & Versions:
A vulnerability was reported in Lenovo Vantage prior to version 10.2003.10.0 that could allow an authenticated user to read files on the system with elevated privileges.NVD-CWE-noinfo, CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions:
Description:
Lenovo.Vantage.RpcClient
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\Lenovo.Vantage.RpcClient.dll
MD5: 39cdb8de8da4609ab39e3e2ceeffdb13
SHA1: 1e428854278a2970b17c61ab85de66b2dbcd4505
SHA256:0073eb42c1a289c3400655fded9d1640e43d601cfda7abefbdf0d4db9fdcb70f
A privilege escalation vulnerability was reported in LenovoBatteryGaugePackage for Lenovo System Interface Foundation bundled in Lenovo Vantage prior to version 10.2003.10.0 that could allow an authenticated user to execute code with elevated privileges.CWE-269 Improper Privilege Management, CWE-428 Unquoted Search Path or Element
Vulnerable Software & Versions:
A privilege escalation vulnerability was reported in Lenovo Vantage that could allow a local attacker to bypass integrity checks and execute arbitrary code with elevated privileges.CWE-295 Improper Certificate Validation
Vulnerable Software & Versions:
A privilege escalation vulnerability was reported in Lenovo Vantage that could allow a local attacker with physical access to impersonate Lenovo Vantage Service and execute arbitrary code with elevated privileges.CWE-290 Authentication Bypass by Spoofing
Vulnerable Software & Versions:
A vulnerability was reported in Lenovo Vantage prior to version 10.2003.10.0 that could allow an authenticated user to read files on the system with elevated privileges.NVD-CWE-noinfo, CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions:
Description:
Lenovo.VantageService.Utilities
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\Lenovo.VantageService.Utilities.dll
MD5: 5b3da9e60e85323ad9d3a78bf1100a7c
SHA1: 1d1804f41011b3fccbd56abe4594e0416e14ff68
SHA256:81966078462467c53dbe75ad6944789d8c89a16d96730c222c9cfa6f91f08d63
A privilege escalation vulnerability was reported in LenovoBatteryGaugePackage for Lenovo System Interface Foundation bundled in Lenovo Vantage prior to version 10.2003.10.0 that could allow an authenticated user to execute code with elevated privileges.CWE-269 Improper Privilege Management, CWE-428 Unquoted Search Path or Element
Vulnerable Software & Versions:
A privilege escalation vulnerability was reported in Lenovo Vantage that could allow a local attacker to bypass integrity checks and execute arbitrary code with elevated privileges.CWE-295 Improper Certificate Validation
Vulnerable Software & Versions:
A privilege escalation vulnerability was reported in Lenovo Vantage that could allow a local attacker with physical access to impersonate Lenovo Vantage Service and execute arbitrary code with elevated privileges.CWE-290 Authentication Bypass by Spoofing
Vulnerable Software & Versions:
A vulnerability was reported in Lenovo Vantage prior to version 10.2003.10.0 that could allow an authenticated user to read files on the system with elevated privileges.NVD-CWE-noinfo, CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions:
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_01d078da8c0f4900\LenovoUtilityService.exe
MD5: ec6c0675af030075e84d121ae581c56c
SHA1: b1e9651c39e6c9cdcb507de03df28f4db7c916a7
SHA256:dc45f3776f224bfe67f48d2f1d49930eb61ded6c6aff61dd3aa155f7044869f9
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\LenovoUtilityService.exe
MD5: fa97fd34b8f9e390fa5dae92b275513b
SHA1: accc7e95f259b04e8b9e18a9765ac8717706bb17
SHA256:278576e7eb46ae4dc26956e828e51605c82a5f2db694e46e28a99fcbbd866e57
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_fdde6ecd49c3a98b\LenovoUtilityService.exe
MD5: b7c3cfeadfee231e1569a4a484f7e445
SHA1: 04718bd3e506c90228d2cdd58db8c5329569bc4f
SHA256:d9739174059b6aeebce96a6830c66dd21336558a78c51fd9839c190c1dc554d7
File Path: C:\Windows\System32\LicenseManager.dll
MD5: b334ee5a83239a90b79a081a937dad70
SHA1: f8231c1804d4c50ccac40e52b9c964f018666b35
SHA256:dda67a78b23442a65a5fa7c1a4a1e0f4ce4e78067b3d95273c46ea03a5c76451
File Path: C:\Windows\System32\LicenseManagerApi.dll
MD5: 50d608ae35399e2528b1caf69b54b035
SHA1: 3d255bc4f74a3365ef214f25ede3fe6ef62d8761
SHA256:9e517a68487e27f7bd5bff71321c3a20a2bb180b2781b00d8d35d0ea93ebdb7c
File Path: C:\Windows\System32\LicenseManagerShellext.exe
MD5: 14238282b7e23c976f0f72967f021df0
SHA1: d53bed6ba274991793f6e918c75e96a8e67635fc
SHA256:168041fe3103d55edad2aee64e0de535d1f3e624c80e6ea34e4b26ab798a8036
File Path: C:\Windows\System32\LicenseManagerSvc.dll
MD5: f752c3ba897b77976ac306547a81e685
SHA1: 08de4c4106119a008327c49cd72fb7509fd517ad
SHA256:f457916bcb961aec92bcfbe60d58ea3b8c43d8790b693475bf88fda77701e209
File Path: C:\Windows\System32\LicensingCSP.dll
MD5: cc5fb6aff5a79b7f76ad7670d5489358
SHA1: efa4fc81334e4c1e5715ce7ef47272e5a7f747d3
SHA256:76bd05775b4e0dd24758c93937f97a57dbd7efeb4a14ff717fd448e8ee007838
File Path: C:\Windows\System32\LicensingDiagSpp.dll
MD5: 50dd6251fe1056603303f55ee7e04330
SHA1: 8693b255170567801a0c06d7ae7d6612b355d99d
SHA256:9eebca48931cafdc26f170de4ce1f1ca7a32d64a6050ff40921350fc4a7e9c06
File Path: C:\Windows\System32\LicensingUI.exe
MD5: 4d691fd9626928959bd89d64b6814b1d
SHA1: 0c9666e1937aa22d948f149700ec791a6c428956
SHA256:05ce2a7d84107eaa48d2a184caa1da5c91758c148459f2d108134a92697a00e7
File Path: C:\Windows\System32\LicensingWinRT.dll
MD5: 70de5880ce7f82136305ce2e132c1ba5
SHA1: 1e89f8f219480b677fc221fda0d085b21fdba162
SHA256:64cc96eb0187d0ff33170a4653a545bcdbe79892a722c1a0824abb72e943fd53
File Path: C:\Windows\System32\ListSvc.dll
MD5: f7ed743e8af4d9948ddd7fefa512c0f1
SHA1: 59d869dbb58201e83e591ebef69c3d746f115a1e
SHA256:04fbae2d6d680f329dc5b5e0f4387f2b3558cbd5495388220f2134bcbde520a3
File Path: C:\Windows\System32\LocationApi.dll
MD5: 1cf76d60837f419972b3ef77bc816970
SHA1: 8f17b472d9bdf126026cc970267b3c1efe86914a
SHA256:72ea88b2d9a32f324e876ac0b1184d6f9a5d13026e13f3584d6762d559f1d231
File Path: C:\Windows\System32\LocationFramework.dll
MD5: a2f6c0a4cea468c0912b2f6872be8acd
SHA1: 63179366e20342689097a36c17c99b3e629d44d5
SHA256:2b9a044919e9768dedf00432b2c34928211aaa96f288f257b5136a101a4e33b6
File Path: C:\Windows\System32\LocationFrameworkInternalPS.dll
MD5: ea4f5e8c0f4ffedf56efbd6c6eef9953
SHA1: 90ccd634fd0d4a45366e95cd2247dfd991a5ad78
SHA256:f0f18ad93ea9f3991efdd8cb7453c0bac798717aeaa6add48ddf632edabec95e
File Path: C:\Windows\System32\LocationFrameworkPS.dll
MD5: 8db2fda5c94700e1bd08898c533f2729
SHA1: 418077dcf1981792b80d4f41d831d5895a580454
SHA256:81d60a747184d1832726dc80bb8bccf987bd783cbd62d8f51f3748bbe429c702
File Path: C:\Windows\System32\LocationNotificationWindows.exe
MD5: 06dc7ffd25766e98ec4d6cc5c83e2c15
SHA1: 3784509a03eb6022324a2b52a732db295e930ff0
SHA256:77c8497058d9f189cda65422da3c340be8645ae6c2ef3ffad927ed7b00a6b382
File Path: C:\Windows\System32\LocationWinPalMisc.dll
MD5: 3196f0db4f7fe350c19d43394dba4402
SHA1: 21a23ead1640fe18f1e7925067cf3951f73c1518
SHA256:cddcbd785506fe5e1e4603a0d6192ae474ded11cfa982650e33b97c079014a9d
File Path: C:\Windows\System32\Locator.exe
MD5: d45676c47616b9abbfaec97dd3b240a8
SHA1: defe4561f0a6b279cacc18e8b92728046709110c
SHA256:e13985d667f66b7a0082356f23270f61a57b8c2dd211b1e09d66d7970d7b4d6a
File Path: C:\Windows\System32\LockAppBroker.dll
MD5: b362ecd98d4779156422c34d4e1ff74a
SHA1: 36b4c3be4b57ac0c383566444c24587bb524ef25
SHA256:1f69919c99e14d968ed87846bdc34f653d0c64bb42f71d7fb819e401a1c09502
File Path: C:\Windows\System32\LockAppHost.exe
MD5: 05484be6f4f2d55d40c067f4e8185c59
SHA1: a46e72f04fc7337524edd046959c0e58ee99ee1c
SHA256:40d2f93dbe8fb02b2ef3fcf1ba05b3cbfaaa71d2ee23e7816ab5d9b6a7059def
File Path: C:\Windows\System32\LockController.dll
MD5: 6f39378722f79d8e7d31e7c1c73ecb8c
SHA1: 2b9368f56bac8ebb4cd4184c8ee3fb9b0ca829c9
SHA256:2f537f0c13770d29d3150203de4cdd662ebb7b0e1bca812f6bf89832d9d4e199
File Path: C:\Windows\System32\LockHostingFramework.dll
MD5: be2956c65c3a53692b6bc2886517c470
SHA1: f315f3d5ce55642a77b2513c508fce531db70dba
SHA256:0d0e96eedf717ca7fdfa3c3c03d38ac4e164a450beaf2807009094747d83f55c
File Path: C:\Windows\System32\LockScreenContent.dll
MD5: 248ade817bcceb5d41a2980fc8eb2e53
SHA1: 1c4baf126fab6f5c2d1ac6435ba319460df44924
SHA256:3e4037796fe72fd031255ed8562d96bb590bb8061aac575a0d90f96b522157c8
File Path: C:\Windows\System32\LockScreenContentHost.dll
MD5: ca1b49f296ebc7445d2325121971b363
SHA1: 00ad28396c190c9f4c3089b03527a5b52a97b2fc
SHA256:b3a523fdb0af715da0682ce6f09964366e9ea705553d2234fc3a8485b2848834
File Path: C:\Windows\System32\LockScreenContentServer.exe
MD5: 2cf29ef0ae66fcea7056ae948ffd9541
SHA1: 3d493a1afae9b38d3c0953016a00ef3d9ac514a0
SHA256:de9d325af3156232c34916840210efb5706d6e6a5eba1827c8240e4f71c09fa2
File Path: C:\Windows\System32\LockScreenData.dll
MD5: 1ef362dd2de904c022c7f991d502ebde
SHA1: 7a52e8a7db6c72077fc782306c6496426be695ce
SHA256:1a9a5ebe6e06efafa49bc33e9e220d64f24c6a016104fddacb000443ed92f6c6
File Path: C:\Windows\System32\Dism\LogProvider.dll
MD5: 1176e91f4f663b03515b4d944dcdd72b
SHA1: fa341a412720fd79fe1e1f6e11d850a4e103871d
SHA256:a4ae8aac8660aaa255cc8318c7971273201e62954d6d36ac5d7ec738fb218258
File Path: C:\Windows\System32\LogonController.dll
MD5: 1979c9a47dd0672be33a5f4cd9e97267
SHA1: a238e0493595ac63e47d3c5b9e720a74ff365941
SHA256:83962bd3a9068344e0b437ae33b0a6b90f91adae1c93001740762406e8cf6f31
File Path: C:\Windows\System32\LogonUI.exe
MD5: 893144fe49aa16124b5bd3034e79bbc6
SHA1: fbf39a288fc46cbf0620cfd297395a8fb4fbcdad
SHA256:cf01e46c146699f6c0e3dd447043f59bc9438dbbcb9563af6c60ebc6d82727f2
File Path: C:\Windows\System32\LsaIso.exe
MD5: 4c5e774761e616c905aa31fae1030d8f
SHA1: 799403beda11e54f352a4746f0a38f0d5535447f
SHA256:5a4df139092fae5b33bf22555ae4bf9c7f1990d3fb27a78a8ec733089d4e2355
File Path: C:\Windows\System32\lxss\LxssManager.dll
MD5: 8dc16c6954e82270544f341cf473a174
SHA1: b8aae535d7010c68603a996f323fe077f73945af
SHA256:69453ae928d3f55ae491fc8a4547050fc12ef476d522b710e8d256f977354659
File Path: C:\Windows\System32\lxss\LxssManagerProxyStub.dll
MD5: 97ea6d19e4016493bba1752dc0a9f0f3
SHA1: fbaaa209c1a288b190baaf18130c2121f4f22946
SHA256:b58c23ea3305a078153bbacd6a2d71eb456b33ddfee66a08f68236602671a6bb
File Path: C:\Windows\System32\MBMediaManager.dll
MD5: 2117e864be3e2cb1f53407a14be9badc
SHA1: ea1c7974257bfbafde82a7727e06e09490111582
SHA256:6808cc9ba2f6cb081c3ed5fbfb473114c8ee54e582ac432b1f99283603b7dd58
File Path: C:\Windows\System32\MBR2GPT.EXE
MD5: ecf40895785db9c0557b5a53854afa4c
SHA1: 8b5fc6e1079f2aa1ae1078bf47f059b193843562
SHA256:1b1394ee2c08719b6be4e5ce4522cad3da5ab188a145af453f6ad484a6bc42c4
File Path: C:\Windows\System32\MCCSEngineShared.dll
MD5: b171f6008919ecc7622ef310cc1af637
SHA1: afb881cee22d12aaf1dc3dc0375cf63eea39789e
SHA256:a352a80d06b4f2031aa91cb1f64cbe2386e0c0bf369dd3cf2026928849ff0f82
File Path: C:\Windows\System32\MCCSPal.dll
MD5: e1c215b704cfb861f11e81364484ea49
SHA1: 3cd242c715e0743d17277265d811d1cb2e972576
SHA256:71d807de5c25cbd81fc62be785c33f40be23905788db372c083b87ad55d9c606
File Path: C:\Windows\System32\MCRecvSrc.dll
MD5: 200b4a7a6a8cb961fcb0431083f326d0
SHA1: be60dc60a41cca47288f3586a5d6b8b3db63a50c
SHA256:11dfbc856add6f76694b4de17c2dc9168687c2fe084158d39bd5acc07a10989f
Description:
NVIDIA Maximus Configuration Utility
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\MCU.exe
MD5: fa45ad78c57f24b2291387045feac65f
SHA1: c74abe1cd66f72aec3679cf7502c95e41372f246
SHA256:96c73612d0aaaa2a2adcd7cbf2f74e3ef66a2247479039879e7f0443d85bbf0e
File Path: C:\Windows\System32\MDEServer.exe
MD5: 8b3686071bc7f9f39561382afd8dfa9c
SHA1: edbd8785e0645263196aa590b9078455a7823b8e
SHA256:0d545735a02fd66e26df6525f36eb2e5e6f6a1ed3723e0da3e379c8a6f2a1ba9
File Path: C:\Windows\System32\MDMAgent.exe
MD5: 024f77ef20a31da1dea51ce364b99f47
SHA1: 467539eb5a52f4177c95ed2bfdc8c60e63dec662
SHA256:d2be63dfcc1931e7c455b1a04c21e79a6d480c5c1348e180c5241e4d3f49f781
File Path: C:\Windows\System32\MDMAppInstaller.exe
MD5: d196437b1f06a54210aac35042bbe8ab
SHA1: 0d43da7b5f2e9b7c3a5e9d498b17fa49989a52c3
SHA256:aae8ea83bb113e343b516e4fdd0041927ea1c7cf213d2423e7e964cabec669c3
File Path: C:\Windows\System32\wbem\MDMAppProv.dll
MD5: cde667c833ce8aaea868afd67c0d6004
SHA1: 65a903df3fc89af2115de8ca61abd3e5531f4341
SHA256:869ef0604943d7265e982de95ec67d9b923decc511608a71b3385d18d80dbd83
File Path: C:\Windows\System32\wbem\MDMSettingsProv.dll
MD5: a93ebe3bac1eea72b35ee2b3cb7ae35e
SHA1: 9d20b2fcc4ce5143defe1e6db1d5aaba6a0b41c1
SHA256:ec2c9484f141fee178a0072e9d6b810e944490b020711d21b081f729a08b44c4
File Path: C:\Windows\System32\MFCaptureEngine.dll
MD5: 0b901607d02b3417371a9dd0b244390a
SHA1: 11b4fb419dbfa482d74b72d1d18b0a1fefee6e26
SHA256:9f19ffaf7a4e098e784bd48db5fd6e9c22342ef321212fe2ab0f65908fd1f9f7
File Path: C:\Windows\System32\MFMediaEngine.dll
MD5: 514dfc07c6824079604606a3d6e5cf7f
SHA1: 8e57a368ce22bfbf7141e896eb076e8368e644fc
SHA256:e32721bbaf5c3ceff9838e5003e29c390e230f045e4cbf4d83effcf3fc061781
File Path: C:\Windows\System32\MFPlay.dll
MD5: 907ae018a40ffc1723d717b5ac3235c0
SHA1: 1d4603c3b45bdc1d3d811dc5f05866ccbf8e8c8f
SHA256:05d862fd65d33b536e247f978fa98ed2b5bad477da052b8d8cb1b1fca5b18d60
File Path: C:\Windows\System32\MFWMAAEC.DLL
MD5: 9aff52024f094a99e9cf00419554f897
SHA1: 09522b1d3a7ac91a3a83935a969ba781b5936311
SHA256:fcbfbe0b296139d6d05118de7f1d557caebd81bd12a63454b57e5744a983a46c
File Path: C:\Windows\System32\MLS2.dll
MD5: a1ae4f33a35dd335196f9456f7c835b7
SHA1: db47951e97d8c9294d72876101b8fc32dbaa8382
SHA256:e7681c27369102e26b23fae6e40ff4e292cb673bd78f2d1b2e4d1f0671708c61
File Path: C:\Windows\System32\MMDevAPI.dll
MD5: 471cf396eef1a33cd8327011320769a2
SHA1: 25d9b9c7d855879e4af6a865cb4d48a70ff79c4d
SHA256:75a28636c1025f1a5396fa72958c8438f9cb56f236821921a24a70c24fbc982a
File Path: C:\Windows\System32\wbem\MMFUtil.dll
MD5: 9df8772518a13fab86b415c6d5785095
SHA1: a0f4ab027f4673969ed3018f92b446527de042ad
SHA256:6d047a66366a6f0f74bab3bced0e88f80de69691a8decb656939078bef602753
File Path: C:\Windows\System32\MP3DMOD.DLL
MD5: 76cb918a0160f5b79bf82ecd70752e31
SHA1: 68442351776b24661d31029efae7d8e04908e2d6
SHA256:a756b4a6e7181356531a5edf0a75445318cd8e265de02424e9d48bcb5729bdc2
File Path: C:\Windows\System32\MP43DECD.DLL
MD5: 7091a4f80df2bc7d666243fc79ca48e0
SHA1: 23f46cb61a94c3882df65de2784ffda3f0e6ef7e
SHA256:d06da640d689aae9552e5c5e50868995cc48e9e69a3df0b6cc7fa8afc874b019
File Path: C:\Windows\System32\MP4SDECD.DLL
MD5: 141b546bd68f19b074de5ab1e19980d9
SHA1: 6d2e448ec10407530e04d08212233e47602930ea
SHA256:caea93375002fc07d473fd4ed266ba5f8a59d5014f320f26f49c580ce3865010
File Path: C:\Windows\System32\DriverStore\FileRepository\prnms009.inf_amd64_a7412a554c9bc1fd\MPDW-constraints.js
MD5: 6b211fc8a31a7d55204d7cd212d6063f
SHA1: ff5182d1a9826d4f70139f157ec86ff2e2230bf7
SHA256:ad82770fbb4ff9e403b9879c141b61a7dfe443f0f4f2557e884f5abd5c1d5745
File Path: C:\Windows\System32\MPG4DECD.DLL
MD5: 5b4f0f7fb0332cf8d155342de5580c94
SHA1: d54e6123ace8fb11140744bd80628775b236a09b
SHA256:8cfda201e93d0520a0c63c54613fcdd9cb9bad37cca5e8136ae4a2df43a61ea8
File Path: C:\Windows\System32\MPSSVC.dll
MD5: 44806a854a196d93bcb011b0c5d4ddb5
SHA1: 9804fc5aeb77f2e7d4befe4dfb574afd1a5377c7
SHA256:6a5308a4c7f65fe51716ba4501eb8c5fb0e082fdfc9453cf132afffcd1c7ddb6
File Path: C:\Windows\System32\MRINFO.EXE
MD5: 8880da143c3911c2ed71ae4c3e534531
SHA1: 5fce5c7d3f1f077141889e407348da4706d85c31
SHA256:59eea6e8904771a620559ec4f55aed2ca0f5bcf9b14c6d030301f165aa59eb2c
File Path: C:\Windows\System32\MRT.exe
MD5: 016fe3b0c7db4246d946323c10009df5
SHA1: c6addb0255a6aec1e6e862b0128ace408ca0c3b1
SHA256:0308b979a91305d4d3f90a49a1684426fcc65dd5cc0ba6e9c7b46b0d2269df09
File Path: C:\Windows\System32\MSAC3ENC.DLL
MD5: 204050bb02567306968a1d382e3af31e
SHA1: be43a16c199834326e82031dddbd7e5df67b7b14
SHA256:b44063393cb6dc3d953f7f3719d40e86144ae75feef6a864c3a670762f53f0f6
File Path: C:\Windows\System32\MSAJApi.dll
MD5: f3d0b9553ea2f31e0af5bd90e72523fb
SHA1: 98526a4efbce2b9ebb210d0fb3ce3bab6edbf44b
SHA256:568f8715feeba05dfd15fbf9b9cd4d2ad982cd31de7f2c8cde433e7cec049fb4
File Path: C:\Windows\System32\MSAMRNBDecoder.dll
MD5: a9ed3c8131731573de1cca92f9425b65
SHA1: 4422e68648caa58ba6dafaab1cca22cf14f6979c
SHA256:f18b8f9b1ff15737ddfc9082737869729640778509fc6d6b66c73dd3c4d13d8e
File Path: C:\Windows\System32\MSAMRNBEncoder.dll
MD5: 22aa97c462317e275e8e9a7296694698
SHA1: 794c69f922925bb0f64406105e1d0c4f4ae84394
SHA256:0fe09c8ebe834d240d842135eab3b6018c821e8bfd372b8f42c541d011d65953
File Path: C:\Windows\System32\MSAMRNBSink.dll
MD5: 2bdfd7c7469fec83496cb3dc924473a7
SHA1: d10338a3faf549c62f39661dc7b9ee6dc4b5980e
SHA256:9acbe850679cff33d61b9a87df20f7dc855e7856a678e131d2a00e3aab0f55e4
File Path: C:\Windows\System32\MSAMRNBSource.dll
MD5: 21dd8585802c8ddefdbf95c7b4f9700e
SHA1: 77e1a4c1b65edcef679571660a4bfb7a2b029c5b
SHA256:b050cb2685e2da30d72b9bf837754fb07a83566ae97b78f8998cce31356508f4
File Path: C:\Windows\System32\MSAProfileNotificationHandler.dll
MD5: 1109a2a8c32e0cbb88399d6868716dd9
SHA1: 5075679a0d85760febef47d0d3df2617f566b425
SHA256:eb1a38128c2bc151e0fd9af5ef3d56a982b25e0342ee92a7e08f3232d324b55c
File Path: C:\Windows\System32\MSAlacDecoder.dll
MD5: 00c3249b638c2f9b3e55c8b90d48999a
SHA1: 053584a1a4cc2e423aa2ca366ba85336391d2cd1
SHA256:24bd1983e6c5e60caa063e96bbdea17b2e4d2a34f6cf0cb4550df8cef9f198b1
File Path: C:\Windows\System32\MSAlacEncoder.dll
MD5: 89a3c581bc35c2dda23f3e6b634a78d7
SHA1: 3a25cfe8b7e3ca888895aa69a7d5f5225025ef61
SHA256:1b0e6cd7da97bb0deeb9422cd148d51c28484d0c4e1b0e3cb93f754ed213f5b9
File Path: C:\Windows\System32\MSAudDecMFT.dll
MD5: e6f0a697dd83c923dd9516f0c069089c
SHA1: 188bd29cfa614f349b145eef3326870101357cda
SHA256:1ee1de922b6d76044bfad470209b717cb36a65546225e15102c553e8d1db46c7
File Path: C:\Windows\System32\IME\SHARED\MSCAND20.DLL
MD5: fd77f01c21a28600cd716f7e7b89d314
SHA1: 7667966bbeeecc0c38ebe0c89f339a9e4ec51087
SHA256:02b794b9fb2439ceaaa50666bf69aa7cc11fc5c077a682308c336133a08f22d7
File Path: C:\Windows\System32\MSFlacDecoder.dll
MD5: 3ab712bc6bf504d1335d00edf5971167
SHA1: 1c046bbadb834e1e14eb174cb2aeefa5aab514ab
SHA256:012910981b105b9ae1f315d5235cee8da65f6bcf10645f09d93fad0f6f7b39ae
File Path: C:\Windows\System32\MSFlacEncoder.dll
MD5: 858eb140d81f98da0f6cd39a5e90302f
SHA1: 80fc5d3b4ad097bc041d58a49bf7be12e18b3ddb
SHA256:09d83df206ce36ea1db297ae9cc56b3f944f6c0ad0f8454cadcb620eda7c265e
File Path: C:\Windows\System32\MSHEIF.dll
MD5: f074695d7e842a088673885ecb395fe9
SHA1: 9a911eaae565a129e378972380cc1c74cd01b1b4
SHA256:298989c623cceb19939c955ff4d9b63dc8eb8f5c9b6353585634128216dae3eb
File Path: C:\Windows\System32\MSMPEG2ENC.DLL
MD5: 070459f1aba5e4ce192bfa389ffbf6c7
SHA1: 3eae2e5bb8bd0d2b26acf870387a5194c5358b02
SHA256:64155ede50ef9e8d914b7c8e9befbf0fe36886568f32fef7a124e8b6c833678e
File Path: C:\Windows\System32\MSOpusDecoder.dll
MD5: 0d9a3ad7c7614eed1defbeb02f7b7e15
SHA1: 36292901f950cd8b3c90f99b96ed264f84f38d52
SHA256:b3a2a1ef411049b8dfacb1c070a4864c082fd0792c6e2805c947df8e60336ec5
File Path: C:\Windows\System32\MSPhotography.dll
MD5: 45cfd0b1fab78555b3a8f5085a36e909
SHA1: 2ef5b28603c349527c384ccb18af4b84b6baa5a1
SHA256:30ddae278eaf26055b994a9d2801d03b53ed80b2874375cd8b9140492ce89872
File Path: C:\Windows\System32\MSRAWImage.dll
MD5: f75e7bade3310991fe28db991e8f315b
SHA1: 338732775f7289ccb282d415b5679bc53654e47b
SHA256:b0da8107b5406afccce410f31b90a00eefe2b695614f618642ecb75415d77cfe
File Path: C:\Windows\System32\Speech\Engines\TTS\MSTTSEngine.dll
MD5: f9512c058964f125c0c0883c0cca225e
SHA1: f5be9e7decf8a6bfad3411ff8ae15e8f40405215
SHA256:41ce9b38d03e80088a744c13229cab4bc4cc9fbcf60c0e553a8e66ea8f9b07a4
File Path: C:\Windows\System32\Speech_OneCore\Engines\TTS\MSTTSEngine_OneCore.dll
MD5: 6eac4b6eb27f314e4b95b77af0938065
SHA1: f631bed8f8c6e1468703597bc7408a93197b6dfa
SHA256:beb281777b408b0e8efa83d2efee9069809ee9521872551a90cefbdb86524eea
File Path: C:\Windows\System32\Speech\Engines\TTS\MSTTSLoc.dll
MD5: 40eb1f198a18021833e65a076955b03c
SHA1: 730f666a44942ad4ba59c69948036c57b5db9827
SHA256:4ed0e11df812cd586423182568e2f28b3dba92f85b5fda68351bf97468083079
File Path: C:\Windows\System32\Speech_OneCore\Engines\TTS\MSTTSLoc_OneCore.dll
MD5: dc11fc7d6d7d1218338d465fa3b6b454
SHA1: fd9219a08ec874cbaec1ea6997e0fd1aab6e1230
SHA256:63f208910bb6d42cf026e97a2674885da83bef06f7f472c42a15c295c5019be9
File Path: C:\Windows\System32\MSVP9DEC.dll
MD5: c1cff29687be899d73791985b1adf78a
SHA1: e2c33e842f2062e923edf44b233e6e2a49ce5d0f
SHA256:d84ecec82845b4c29110df43c81627886f7b21036509005dac19d242c6046ab1
File Path: C:\Windows\System32\MSVPXENC.dll
MD5: 62aa19f31ade9ee6bede5ef9fe59d0ca
SHA1: 71de25864dbbffb3f61fecd1e4b3554c293c26c2
SHA256:7abbfdef84c1a2798ff593804244654e97d7657f57e557c88667c6f2bf431021
File Path: C:\Windows\System32\MSVidCtl.dll
MD5: 081a0b13a30d85c7712df86909702c08
SHA1: 426576169d753a8447beb3b1c50fe07c545dc044
SHA256:2eb18c77623c594022597acea57d245560b6e598e3a166d2fc5bab86facc1d37
File Path: C:\Windows\System32\MSVideoDSP.dll
MD5: 9e640713d6d756a1432ff60b3b40a0d2
SHA1: cd2a5182cb386eea4d17a82852d7efc2e942567a
SHA256:522c123238444fa61e8b25b6077ed22136042d78860986d623c553ce0d5e4618
File Path: C:\Windows\System32\MSWB7.dll
MD5: ad3789a960d3050e3c28cf8901850b5b
SHA1: 9c6059b4595fbf4432649080ec4435f2a31692bc
SHA256:84af2e0c2a72596368b968671bdd03d89b6191b19be596092a1f4925230bb034
File Path: C:\Windows\System32\MSWebp.dll
MD5: e4bb73d14b84d92f495e3ccb2b4524df
SHA1: a91ac68858d6328855bd42abe0fba361f34097cb
SHA256:b42f71ff613cf5d27952ed03a699d097fc2ed1957856de7564ac0d63e69d1b02
File Path: C:\Windows\System32\MSchedExe.exe
MD5: 89e7c865c8d862c55404b8b9a5f4b371
SHA1: 54f5e4c43388c958a1ed947e2bb9e0e5d8a43277
SHA256:b48d5b58d9bbf92fbffba06d98e695218676d3ba1d4a060c08e3b9ef1650110c
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint4.inf_amd64_1987ca3a0b344cfd\Amd64\MSxpsPCL6.dll
MD5: be86ee83b8824e2f2d5db1512de36a63
SHA1: 3ec1b52d08429d09d33974f341f3aece3fc7a86f
SHA256:95bccdf22df8ae3631b35f5e9787e73de0de631fb3968feaeed664fe1e44ea61
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint4.inf_amd64_1987ca3a0b344cfd\Amd64\MSxpsPS.dll
MD5: afab28be6f8607908238dc8e8e30263b
SHA1: cd7c4ae59f562299fb2dd3c450cad61b121c7ed7
SHA256:fef1b516d6be1d35af2da628e69f5c53d0e49a96acfd628cf218b3b7b477f27b
File Path: C:\Windows\System32\MTF.dll
MD5: 01c4871f7d68cfa2a165d6a5f631df33
SHA1: 8107fec0e70463b52bd7642ad9dfc584646e3370
SHA256:782d51806df697ec5f7336baaa480f3cd5deb49f9cda1a683a9590160e8df158
File Path: C:\Windows\System32\MTFAppServiceDS.dll
MD5: 91e136c6ebdf5809a0a7e5dda71d6216
SHA1: 35d44d12248e191cdf24ef9a0af3e22692d0c03d
SHA256:30211310afd198fb7245dac1593b451aded10faf46fd33b6d1e08dae5dc054ee
File Path: C:\Windows\System32\MTFFuzzyDS.dll
MD5: 550269491c7954f2e1fa191a19be6ed4
SHA1: 87b1ad5378c80a25abe8a58f78f04bf9191c8b90
SHA256:f95e03c51c97beb1f49b6ab738e8bbed270d76a4d31af101785ba6173df48b79
File Path: C:\Windows\System32\MTFServer.dll
MD5: 43880c9d7eca0aa36ae2a217f525648c
SHA1: d2220ccf3dbe6b781ca332427063eda66e870684
SHA256:ff5defbe9ec247dc803224e7d6974902f41c9386f90e572518b5a3d285db0ece
File Path: C:\Windows\System32\MTFSpellcheckDS.dll
MD5: a3d78c59e0c4b3ae9cd7402719a69a3c
SHA1: 8eca9b4131383f34c032a554faeaf81ac15cf98b
SHA256:11710268818916a0dffc83ce8461c564af0772fbab58f9c6e8e921b8c8a94c67
File Path: C:\Windows\System32\MUILanguageCleanup.dll
MD5: 2f076be586b857aa1c62f5547d23175e
SHA1: 51e575ec6362c7486ebdf8a095f179e0982d11fb
SHA256:757fdf563e1c3fadb3653162c2931e31026b27c756157e2edc647046b465551b
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_amd64_8418b8585d9586f6\Amd64\MXDWDRV.DLL
MD5: 561302a2e0ea372ed3e4f4c5b781c16b
SHA1: 1b8d1e1e970c20ee4a644b3b2b474721e6b2f854
SHA256:f19d71a11d0058645978636a6e6ca3e1eb60f2460ba224fe39d339a340046cd7
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_x86_8418b8585d9586f6\I386\MXDWDRV.DLL
MD5: 75a84de10d5bec6504f32900684070a8
SHA1: aad3e931f093e11df7b006f620713c0a14d0a980
SHA256:262d6517fe760a4b1d935cfd283e9da31dedec9c533813d6ab54b3239f8e9c60
File Path: C:\Windows\System32\migwiz\MXEAgent.dll
MD5: 32807a0658bcdfb94a371a6592d3f180
SHA1: 6d40d8ed6458935ad343d6b0009fbda43b4948be
SHA256:604f190ba001073cc15dbaa3ee194819c9efb7161b54b2f4154823c07f1feb98
File Path: C:\Windows\System32\Magnification.dll
MD5: 020c2b9c599720e1e9114ca8e7e9270c
SHA1: 3fa885b12c95c4a7607ede7db821c728e9d20b57
SHA256:16001c3e9bec1ebf0a77273d07e6024a53b27a73cef8f1c1a23e2564b42b4b04
File Path: C:\Windows\System32\Magnify.exe
MD5: fcc2664fffbbda2befcb2cdf2f1b0b37
SHA1: 336326aaf9f298ad4d67b2beedc92396e66cd06b
SHA256:041a4d6748e22b1e2d3519277c95284198f094da8c41db4c5b7bb10f8204c492
File Path: C:\Windows\System32\MaintenanceUI.dll
MD5: eb73ae3d53da90e20670f6f995f05de3
SHA1: 3bf0055b0e9a62d70c424b323ea3566551b72847
SHA256:f2bda5aa1b90027ef46e21c82656e44a9d19db13e04a34bf7504bdef59e75353
File Path: C:\Windows\System32\ManageCI.dll
MD5: 3d02de8b0111786996e528f7ef7e064c
SHA1: 191fbdfe476c7785dd6cc623ff55b9826fdb3cba
SHA256:367ec6d7312f49ba10c2b687ee743e1839ba9218b506b7af911687e78bbbaa32
File Path: C:\Windows\System32\MapConfiguration.dll
MD5: a462efc1b5ce14d7d2831f63d159c358
SHA1: 3eeea1fa9cbf22e9407340e8cb198b8752b8decd
SHA256:a10aff89713fe400f2d23e29685dc78875343603aa94a7417ee31023497b699a
File Path: C:\Windows\System32\MapControlCore.dll
MD5: 94c5cbf1e2f1ab4ea5945d3fbcb95d69
SHA1: 89fb16943b3030f1c63dda8ed0f63eff6094ce8c
SHA256:aa5756acd4a194d1512e80f6b75e26db48c07ef1122ae0f182ab8e47697defcb
File Path: C:\Windows\System32\MapControlStringsRes.dll
MD5: 751b20887f8cd4c7dbe60c884406e684
SHA1: e431e49afae48d4f99312cdfcd0d28fc028bf5c0
SHA256:66c2cf82e04f7ade1c3dec195f1260ac88fd23890e755263fc6100a8a293b048
File Path: C:\Windows\System32\MapGeocoder.dll
MD5: e0bed5485a2475edb5be469a955cffc0
SHA1: 3f91c2e2b300d4b42a896c5e4880b58800cc6587
SHA256:814c28005a42125b979d0f17f56220cbf905640c7570fe6ce14356f299cbd3c7
File Path: C:\Windows\System32\MapRouter.dll
MD5: a0c7b787bfe959306721933910a2bd6e
SHA1: 1390cbd2fdc65613f75909423bb57ee34feb5135
SHA256:6367a0111c6322f13466ebc35c50067b1dcf10fa62e87fbc19dd2852359abcf5
File Path: C:\Windows\System32\MapsBtSvc.dll
MD5: c8870815380b41eaa8d295d019f88db4
SHA1: b1467f131b60e8f70af0ae291af168b906c8a04f
SHA256:a8a8f39e3a13b9bd3df68c7fbb2e0c072b71b6d301422aea5d1ad51ba6c9577e
File Path: C:\Windows\System32\MapsBtSvcProxy.dll
MD5: d12e1e1acef048adf08652e89bdd5c7a
SHA1: 358ff2f152afedd38fa00368a9e0f55eb5ccba49
SHA256:2c8794354b91d360d7b251e5b5a47a1b91fd878567da6e27bddc7b1f4010fa97
File Path: C:\Windows\System32\MapsCSP.dll
MD5: 9126b601b81b89509a02624d0a3a8e0e
SHA1: 114e026635ed25cc6792c0791036d0eb09a19064
SHA256:c4fb0c7d2792b9a1edddf3fcad09926044625b0021747f7f7586e71f009040f3
File Path: C:\Windows\System32\migration\MapsMigPlugin.dll
MD5: b5a83238cda449636e122436ae4de0cf
SHA1: 847d91ffa69f0cfc20729893fbc8dcf9b19704db
SHA256:f70edc6428af0cb663f976125a9b5f88d73040051180e9258584ef527895622d
File Path: C:\Windows\System32\MapsStore.dll
MD5: 348c5d7e0e0b23971cc89c56263ce60a
SHA1: 9f6a3cf8ca536cdf4203994812192fabd4daade6
SHA256:0e0831dbb7c023cae9c5ad7d3e761e66c66d443a7ac0d439a6a0203ebc827ce3
File Path: C:\Windows\System32\MbaeApi.dll
MD5: b81cc00efa37e10381b60118291fc313
SHA1: 90c814fc2211abd7c6e6cfd864c3f0a2fc4fe59e
SHA256:26659099da7922aad4c08c7cbaa69c057686a8006e2287eb3b69fbcc99e9c9bc
File Path: C:\Windows\System32\MbaeApiPublic.dll
MD5: e8100d2e8b33e52ec007fe4722a95c04
SHA1: acd17a6eb5a80e340cca8c8e0d6e410943da0f10
SHA256:c000f7a61d68cad6c4edd4d8ced4eac87e7812e15d4c1a02b2d71bb9f710072e
File Path: C:\Windows\System32\MbaeParserTask.exe
MD5: d8728cc5e5d3cb8a04972d2e0c21ee3a
SHA1: 45986fac70a9a20fe8798c042df325f1631e8dd8
SHA256:e7ec0402b1fb18e41a6ae0f88464d0e07f314fbb418c93771ca94eb0ec60d4ec
File Path: C:\Windows\System32\MbaeXmlParser.dll
MD5: 84743a5e88abeed374ce921139b255b4
SHA1: c07146c56259fa74054cc19373be43e4e1362d38
SHA256:d793f95e7c8fe95f0f281df7ec687aa78349c863c24c6efec4ee7c54c7dd306b
File Path: C:\Windows\System32\McpManagementProxy.dll
MD5: e75becdaabc96d74c22319628d156e15
SHA1: 9de8507611875bb93423bec72512474969a69c88
SHA256:07478e89fb3700aabd73dca42e73cf9dea0dfc0dd1f836d8e72a984a3e009855
File Path: C:\Windows\System32\McpManagementService.dll
MD5: 6b4bfc5c969b449793c0203c949e8f90
SHA1: 8ae9558c97a8caf2814772fdeae1b8cafc49a0d2
SHA256:dd54470fb108404c7dd83bc888a99b740e511e4131cd52ecab02b033a2fbd214
File Path: C:\Windows\System32\MdRes.exe
MD5: 0c523f617f069e18124660a1486d6b6f
SHA1: 3753404a31a30f60b5e246579deeb7bd8a3b3f29
SHA256:017f58759130eb04830148c5f71d866d9d9c0a231ca67440d335b8790c19afe0
File Path: C:\Windows\System32\MdSched.exe
MD5: 4ff2cceedc45b573012b35e6dca467aa
SHA1: 409d14b3aeb39d8480eaf5b981d3e009276ee5b3
SHA256:043cf5da5a37a30ecc4bf526a811e7c474843fd25e45c691b82c1458318686e8
File Path: C:\Windows\System32\MdmCommon.dll
MD5: 745b91d3252f0d6f94a12d294a906716
SHA1: ce94d0668a49c1c9b1aceffbd9c03abefd24fc14
SHA256:d0bc281844a8dda33982c2d91f6ccc1d7181b11c5ca39be4f670438b74eaf7dd
File Path: C:\Windows\System32\MdmDiagnostics.dll
MD5: 8505ef536f3be2223a9dfa49dfb43cc5
SHA1: bae81ec8b82f9a52738a95247eca1504f1421c4e
SHA256:a7362dff7d8b9fb51ecc4fefecff7e3a556b8febef36fc597f81fecb4565ddc9
File Path: C:\Windows\System32\MdmDiagnosticsTool.exe
MD5: b2cbfda8ebeead77a5c392d6b32b7c35
SHA1: 749664f75e0810949a534fc8837e90a79e527dad
SHA256:56c4ae89f8f72d0cc53704d849036be99c9ad5a1f2fe3a2234e706549eaccb39
File Path: C:\Windows\System32\MediaFoundation.DefaultPerceptionProvider.dll
MD5: 1058fd27ac57d671530cd1e3594b0af1
SHA1: 1d0b5f694a0e9898514bd6d2c8a3d00a40e94a52
SHA256:bb9829e7753fee351241914a77f4383d196ffc1504d12b8930dfba76dac63368
File Path: C:\Windows\System32\F12\MemoryAnalyzer.dll
MD5: 54d143d30af6c2a039f782ef028be696
SHA1: c4f2ca384b8489b9b2ad11e3d870cb2f570b4619
SHA256:7699e2184df8bb58beb5472ca5798488c68b2af4b748b626a9bafcf535f1216b
File Path: C:\Windows\System32\MemoryDiagnostic.dll
MD5: e55f12652e911d8a82628d115ec6d735
SHA1: 99b69caa174b058a34e6998d3a1426055ab553db
SHA256:2bcdcd7b55cea95661d6ad19ac7caffc50bd447bed2dfa07c6fa47e689e7444e
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\Display.NvContainer\MessageBus.dll
MD5: 06379c7dd49e03ce83b91baae228de2d
SHA1: c398a8def268ef2aa3e8f0069d7b0e6c69d2fd8e
SHA256:502942206793be91905e5ffc4eb6a44cc4910ed05045b9f676c581a9934d13c2
File Path: C:\Windows\System32\MessagingDataModel2.dll
MD5: 50c965a7f9bed0e65c338390e19bdf20
SHA1: 466cec0fefdae5f6c7557422b21160aa7b326118
SHA256:4f3a9d64fa2819a51cc37522d612a3737d50222ec74af91c9563514244ed80ca
An issue was discovered in the model crate through 2020-11-10 for Rust. The Shared data structure has an implementation of the Send and Sync traits without regard for the inner type.CWE-843 Access of Resource Using Incompatible Type ('Type Confusion')
Vulnerable Software & Versions:
File Path: C:\Windows\System32\MessagingService.dll
MD5: 1f9d4ce3a4175642af1ecd9cc761a4f2
SHA1: 67e1eb74c2b262dcbd9f67a3626412278b58a99f
SHA256:2961a4a908c0a16f463f6dada3bca0bc77632f292cb1061bbbf4879689961f37
File Path: C:\Windows\System32\Microsoft-Windows-AppModelExecEvents.dll
MD5: 812dbef539106bbcbc02f2d5e25cb480
SHA1: 6e43ccf7f4a15aedb023167fa0ba4a801295f159
SHA256:60ff2b02b4e6164a7417652dd1720b41369936f045d5271bb9ebe0663ebc5f86
File Path: C:\Windows\System32\Microsoft-Windows-Internal-Shell-NearShareExperience.dll
MD5: e04adc028739ba8fcb936f2311cc1f3d
SHA1: 30083bbf06b6ac75d854d6ba4cb6980447ae705c
SHA256:80332fe63ae0dec0b159654cd888277fd7da850257b16b5699aaf3acf7292406
File Path: C:\Windows\System32\Microsoft-Windows-MapControls.dll
MD5: 97ba79e076cb5845586b6c90b3fec41a
SHA1: 30dfbdc4019ec2a6aa4b4e862af5f0b7ed50a797
SHA256:352e35c14a0ec3aac5762556f22fe6539154eaeeedcd9614e735e5aa0ea595ae
File Path: C:\Windows\System32\Microsoft-Windows-MosHost.dll
MD5: 348059b0a770e1f95d3417107968a954
SHA1: d6e48a1409e6d0b4d7fefe31028851a6e0e215ff
SHA256:321a9e388a0e437325411998beaaecb9213823be935f1b37fab9d7cef8984c99
File Path: C:\Windows\System32\Microsoft-WindowsPhone-SEManagementProvider.dll
MD5: 013710ab6de262c6e342571f1798d8c2
SHA1: a798ad46810e0799d36e20a84ae2564200fcb32d
SHA256:ca68eff48f1e5b6158cd0f45571805717a8364a3d34ed469f4c9e76cfe88fada
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll
MD5: 1eee674c310498868625dea70caedff7
SHA1: 0abbc59ddcad3db15079c176ec496a0613c73f23
SHA256:9b4a726db9117ba0a6ec8828f2ff655191df975f898f2ae186ba3933d00c0903
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.CWE-354 Improper Validation of Integrity Check Value
Vulnerable Software & Versions: (show all)
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\en\Microsoft.AppV.AppVClientPowerShell.resources.dll
MD5: 183959fba796120321a17230a9285995
SHA1: 36d19b3aaa38ac24579b3a313a71c39761793ec5
SHA256:b265401e187d8729dd9a461c4587b7255cfa5573af32e4a1f38b5e82de26b0b9
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.CWE-354 Improper Validation of Integrity Check Value
Vulnerable Software & Versions: (show all)
File Path: C:\Windows\System32\wbem\Microsoft.AppV.AppVClientWmi.dll
MD5: 8c5858dd257d02f389693c862ff94518
SHA1: 5acfb5b958e679b224fac92663d1bb55efaf8f58
SHA256:e6807221e1e26c9b1ff1738e705e93e872f2beab9046d75e5f4407e6d48c2b12
File Path: C:\Windows\System32\wbem\en\Microsoft.AppV.AppVClientWmi.resources.dll
MD5: 1eb5e929c3768e2c098c20e92786cfdc
SHA1: 97f29cc429d09b035c4bdb6eba64dcb7c27fea5e
SHA256:63109c9741736d8af1f31960d19531d533861cfaae83e3510fec8b5fc16c8fbb
Description:
Microsoft Application Virtualization Client COM Consumer
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppvClientComConsumer.dll
MD5: 5c3d45b8270dea5066142b91fedc14f7
SHA1: 7be84e30f08c9be7cbbd7c466e52ca19e0617291
SHA256:7256e3faa787b7f20fb377779e817dbc2bb1aa73a874938026b1995ae83e7f7d
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\en\Microsoft.AppV.AppvClientComConsumer.resources.dll
MD5: 8cbd55742616636d8ddb2dee710ad8d1
SHA1: b3df57b87f9e15a6212482fe0efcf201e7b9f6d5
SHA256:4b42bccb95f9d5d8ee1e6434b1334121e0459a5b164cf80c6fd88fa6f752fde4
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.ClientProgrammability.Eventing.dll
MD5: 1e5a9aceb3667a78122d0b30ffac273e
SHA1: a4bb37303b5b7645cf19867799c25608fe4d6af6
SHA256:e36e202dff1df4e5d3cb0b8e3050c40e3bf2ae3181c541c56fb23a80978a9f6d
Description:
Microsoft Windows BITS Managed Library
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitsTransfer\Microsoft.BackgroundIntelligentTransfer.Management.Interop.dll
MD5: bde937891014afec14d9be150dd0d813
SHA1: 2785f110a4a36d976a361fd9b679a0f70bf02cb1
SHA256:bb30e0267780be6c5e2fbfb65c7e87147049b4088126974185848d2dda5a484d
Description:
Microsoft.BitLocker.Structures
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll
MD5: c2e149d9f1038aff5adbd174e00fa601
SHA1: 87bfc6559abb0ff94c982f19f8217d374aa14caa
SHA256:e66eff4b7e2aaa07df01c6aafeaccd64cedae580e470e3251f2bdb3fe2ee5616
File Path: C:\Windows\System32\drivers\UMDF\Microsoft.Bluetooth.Profiles.HidOverGatt.dll
MD5: 31a3ff4ee371f079304ef8e12d38c145
SHA1: 7f28e2764447b5e08a16730568db45cb1950dce5
SHA256:8d8f902eba79fca768442b562a43a986b5c5c2b7088f78e7a865e6525fb0f7f1
File Path: C:\Windows\System32\Microsoft.Bluetooth.Proxy.dll
MD5: 8adda90600ee99b03f2ab12ee45fdf41
SHA1: ca78abe9d54945b436db69477dc9d12365612276
SHA256:2ff6a2b49f89115240a031a402b2ed7906ae2b2b14856a63e956b8d9e644ac67
File Path: C:\Windows\System32\Microsoft.Bluetooth.Service.dll
MD5: afe2b721fbd93d932abd4927cfa3b024
SHA1: aabefba2bcd90ae988659d66b882b0329c49aaf9
SHA256:cbb1f5800049d8d886db1dcef8ff1946dbb24952ad5fb0014f1242e0bae19c7d
File Path: C:\Windows\System32\Microsoft.Bluetooth.UserService.dll
MD5: 82831b1587792794c4d4169a0a7fa9b7
SHA1: 407198c2d869c0a1a71908cede87068887e16567
SHA256:ca6682b2d835d491357947acac2e15b6611370923c9c62c2d4c5ebdab506a170
Description:
DismCmdlets
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Dism\Microsoft.Dism.PowerShell.dll
MD5: ca7ad54d37299ad4cbe14f31e9fcd42c
SHA1: f974d8b0a84d49959afee71d04048d2361a310f1
SHA256:534a22e4c3d7d8b830ea7b7639ef50195b58ae9010f4dd61ad5f7b2be3116d4f
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.CWE-354 Improper Validation of Integrity Check Value
Vulnerable Software & Versions: (show all)
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Dism\en\Microsoft.Dism.Powershell.Resources.dll
MD5: 85f22164e53eb01ba62e342eecee93c7
SHA1: 536a6ccefcd5999a10181fef05cf9192e4e9ef4b
SHA256:12093303e9347e6107cc61abc20c4fb40c711af2ef120d6414394c37ba831e71
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.CWE-354 Improper Validation of Integrity Check Value
Vulnerable Software & Versions: (show all)
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\MsDtc\en\Microsoft.Dtc.PowerShell.Resources.dll
MD5: 1a9f9b50a133a6f16e10b177f4367741
SHA1: a8f5b09908ea98e7e2d7adfcaa76d52d63b2bcc1
SHA256:48a6103208551cb314a6b47add173b25b966e0f87e21b896d552111ad00e469c
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.CWE-354 Improper Validation of Integrity Check Value
Vulnerable Software & Versions: (show all)
File Path: C:\Windows\System32\Microsoft.Graphics.Display.DisplayEnhancementService.dll
MD5: e81b5d9f1602cba3e374607b864cf62c
SHA1: 7fc18f581819a6ec40b525531c45df15c70d6890
SHA256:146bd79289bc9996fd7bafa4d3309c467447ae65b48371c46321eff502300366
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\LanguagePackManagement\en\Microsoft.LanguagePackManagement.Powershell.Commands.Resources.dll
MD5: c17e896853a3e5558f88ead8b4b25a38
SHA1: c4a30f65b07dbb1eec203e41ef2fcd8e9662f0c9
SHA256:0eb217b943adf9df96b28448b9e0bbc844b1b544d33ae5f3c0c6b37814d2e513
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.CWE-354 Improper Validation of Integrity Check Value
Vulnerable Software & Versions: (show all)
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\LanguagePackManagement\Microsoft.LanguagePackManagement.Powershell.Commands.dll
MD5: 46102070ad50ac549c1c64c1c5fddc7a
SHA1: 2d1cac71c6b52a8461ff181b83c469abdc55a244
SHA256:0be673f908db6847d26ad57d201edc9bafb7bdea8aca8bcd4ba0a7f97472399d
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.CWE-354 Improper Validation of Integrity Check Value
Vulnerable Software & Versions: (show all)
File Path: C:\Windows\System32\Microsoft.LocalUserImageProvider.dll
MD5: 961ea8a575798981bd3371933c2b6c15
SHA1: 12523542824745f00e5326654ae303d8be9057ab
SHA256:aa6ab710a6e5393fd0833b7b973d2a163af44c3d2183c9484e16c59566a73a9e
File Path: C:\Windows\System32\Microsoft.Management.Infrastructure.Native.Unmanaged.dll
MD5: 9c56851181025e163ec3a6f789d4c085
SHA1: 0c44bd0fce6ea9dd6b883816774037569d9b659b
SHA256:ba67e190bed02e30364827dbf80bcc7e3e0cfbf4e1667d9615db68a496b0ea03
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DownloadManager\DSCFileDownloadManager\en\Microsoft.PowerShell.DSC.FileDownloadManager.Resources.dll
MD5: eefd192dc51355da1a8b8a1eef82f9be
SHA1: f050a49d7354d40bf2296fcb49385031695e2fca
SHA256:d8cb702f8cec49ce798c8027056165161e68c67c797cc3eb90f035fd6514a592
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.CWE-354 Improper Validation of Integrity Check Value
Vulnerable Software & Versions: (show all)
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\DownloadManager\DSCFileDownloadManager\Microsoft.PowerShell.DSC.FileDownloadManager.dll
MD5: 3bdff69b85cec7dc912a99626d02e4c2
SHA1: c48bf3e9ff09289e36c7fed9b19fce887f1bf091
SHA256:bacea1949b53cd815536d05018bb4b270f4fb6acfe6dd8fdf3526e5c0a7391ee
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.CWE-354 Improper Validation of Integrity Check Value
Vulnerable Software & Versions: (show all)
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\en\Microsoft.PowerShell.LocalAccounts.Resources.dll
MD5: bb184374337b93701f0578c77a5e28f2
SHA1: 8af4bab96580312c7a49e1c7461e50c63f3c20fe
SHA256:5422a9adca7189776b55d0fb28233a137ff36efbdaa39e71171556d2f6cacb78
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.CWE-354 Improper Validation of Integrity Check Value
Vulnerable Software & Versions: (show all)
Description:
LocalAccounts PowerShell cmdlet for local accounts.
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll
MD5: 4e98e0c0a5fc76efab5de58a4531e024
SHA1: b68ee64615ff5f07b1d9e25f16a62f2660a728f2
SHA256:d39ab600d85f6f9eb3369121db33e2841b217d43fba6c4d9d4315fd6b19f0721
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.CWE-354 Improper Validation of Integrity Check Value
Vulnerable Software & Versions: (show all)
Description:
Process Mitigations
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\ProcessMitigations\Microsoft.ProcessMitigations.Commands.dll
MD5: 66970653aeb04e46b030868a53ad904c
SHA1: 59991ec997d2995e43250e4370d680626aa974c4
SHA256:e6669eb28074f06d1d945e7f58cea13f6d72f25488462f176978ea5c35a3cd61
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PersistentMemory\en\Microsoft.Storage.PersistentMemory.Management.Commands.Resources.dll
MD5: f0a641e2c4769af8c7d12d40d5ac75ab
SHA1: 23eba726242443777c03f992a5dfa8077f08dee0
SHA256:aa69f5435c32d07429de6389a6f5def7f222a572a28e6dd46e22d9c7227bfe93
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PersistentMemory\Microsoft.Storage.PersistentMemory.Management.Commands.dll
MD5: 4007342915c7d6af4ebe517be8a002ea
SHA1: 6c669a8644d501a4b5aa59ae8e13c1a51e26fb2a
SHA256:f313bf3b5f3031e960a0844ca7a2ac5bb7ac5a93b179f0578d7217fbeadee696
File Path: C:\Windows\System32\Microsoft.Uev.AgentDriverEvents.dll
MD5: 48d09e84c92283df4dce31468f90ada9
SHA1: 6b1a75301f1d8f75004ae56b7564690c79598929
SHA256:d95e618b380ba1038d57f503665eeae78b15a17fa8380c5252f5ca4aeb0c9099
File Path: C:\Windows\System32\wbem\Microsoft.Uev.AgentWmi.dll
MD5: af0f2cdc919642cc9eccc6422ddd7ae2
SHA1: 1e3dc937939d7733dade5687f602dab1fbe415d6
SHA256:a8ef7a79e7697566f97c165865f5fd55774e59a440871a708e90933080e2d801
File Path: C:\Windows\System32\Microsoft.Uev.AppAgent.dll
MD5: ef3967986cd8d634ab6a1e5137bdb99e
SHA1: ea18f0bcd9e17dfab20f25fa09071a566c295991
SHA256:7c77ac03b9fc3536dba5712ffaa204a9ef902652f40287430847078eafd90e5b
File Path: C:\Windows\System32\Microsoft.Uev.CabUtil.dll
MD5: 283f80d4248c5ad7a56aac22eef37487
SHA1: 8bcce5223fa06bbe85e3577b075944ea8c41aa32
SHA256:88bc80e3b7c1fbad88440a04b20f716669964fa3900fbcfc430a07a3deb7c7e5
File Path: C:\Windows\System32\Microsoft.Uev.CmUtil.dll
MD5: 4e44684923ad1c0266ee985dc1b891cc
SHA1: 4e5c74b423ae41de80b6ed521a0c78e0a7f20c88
SHA256:542dcbfbafa15975c6b70affd43f377009b3e4a6fa55771ea5bff140ee8426fe
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll
MD5: 40faa473b82efe033ebb5ae2585a82ca
SHA1: 89b208fa1344c3107908e3426fca9e0adf623fe5
SHA256:7e6ebe4e2929c075e062093ddd1b953b06f18b49c4a195a7ab1e2e529594ba00
Description:
Microsoft UE-V Common Managed Code for WinRT
File Path: C:\Windows\System32\Microsoft.Uev.Common.WinRT.dll
MD5: 0315a05648c18c8fe8a3aebbc93beb95
SHA1: 20341896ee9a0687a1f50668b8f901917feb3fca
SHA256:1134d3fa5c7b27474d56924e30fe6656e866171e5ecd483a5a3127b9172f410a
Description:
Microsoft UE-V Common Managed Code
File Path: C:\Windows\System32\Microsoft.Uev.Common.dll
MD5: a759c01c833e7652caf6e5b4f9d7345e
SHA1: 33af2faff597ac8f3835a1e41d22306774c0aebe
SHA256:67de02f9be7a28b02cca8b876e71e2a3bb9506052701883ad69c63d9d13b9963
File Path: C:\Windows\System32\Microsoft.Uev.CommonBridge.dll
MD5: f44712747739f32c1640361f648b37a8
SHA1: 5e1182064bbbcd817b043bc327c1d8e390d1d63f
SHA256:c22e45008b2280e753d0509f81b4d5cbf2ee619e638fc6a4617101b052e49c01
File Path: C:\Windows\System32\Microsoft.Uev.ConfigWrapper.dll
MD5: 4786bc41915a63b3c32ed0f2e50c2037
SHA1: cddb21b064891d0c09b4e89c6e7e2000129aa9dd
SHA256:be1da77369d70abf371b2315aa426f13962dc5c514a71ae8d533aa6745cc4a20
File Path: C:\Windows\System32\Microsoft.Uev.CscUnpinTool.exe
MD5: de6d1d25d40b76a0eb8d6b2c3eaa5155
SHA1: 2a2d57f3cc2eaf4cd06cf5c7656bc1de6d886436
SHA256:b652e38b2e72f5cfc55c1f0a36552e9a77fcca9fca9b574bfeefc07182c949c4
File Path: C:\Windows\System32\Microsoft.Uev.EventLogMessages.dll
MD5: 757a3341958d9a23b35c11386743b995
SHA1: 9e28d2109639a01bcb2c36397f03f94155948b49
SHA256:b7754c44763065fa7b1e5b27dfa879e98fc16b4077ceeee312e959c9525dbbb2
File Path: C:\Windows\System32\Microsoft.Uev.LocalSyncProvider.dll
MD5: ee9e7efa5088a7f65f9420c683a18ac6
SHA1: 4b774bd06ec15450ae15042d09b50402d881c7bb
SHA256:b70565de9dc4a2069fcb0c8c7904c63d6ca893fa56e84eaa512ae84951c6a2e6
Description:
Microsoft UE-V Managed Event Logging
File Path: C:\Windows\System32\Microsoft.Uev.ManagedEventLogging.dll
MD5: ca0b0a5056490d9bd06703c0f51051bd
SHA1: d636e51f209691e7f19dd88fbe7c1882165713a2
SHA256:787d1743efd9c46de06ee59e464e7a0b0eaf00657eba1d73ae3ab7f35b2886fb
File Path: C:\Windows\System32\Microsoft.Uev.Management.WmiAccess.dll
MD5: bff731d00bc1cc81c60bf35cc9fa3542
SHA1: 24eb1c6368280c0d4296c786e0b7143f2b6c6c57
SHA256:27a126a11d33d4245ae0c0223f47036d76204ff22d2dd3d684a2874550a4fdfa
Description:
Microsoft User Experience Virtualization Management
File Path: C:\Windows\System32\Microsoft.Uev.Management.dll
MD5: b0e31223cb00991f2e6461b65c26601d
SHA1: 54b9df3ed0916461c5c08c7c8b51d5d8f2752849
SHA256:b2e255c7ce4422f44bc3f9c9db12e7204d74165c719df456fe43af5959229205
File Path: C:\Windows\System32\Microsoft.Uev.ModernAppAgent.dll
MD5: 24e340e2e095c5e1435ba0dc906eb8c1
SHA1: bed79758c9b84bbca82fe5499244243564c5a310
SHA256:13d1e1c8b46e620c6550a5e41c86bc28d737583b9ae55c563aea8dee43ca33e5
File Path: C:\Windows\System32\Microsoft.Uev.ModernAppCore.dll
MD5: 954427f545504a8b0f93552231ca497e
SHA1: bbaa8f109bfed9abea29843760305ad777781875
SHA256:5534bc2df608fcc072ad455b5123fba20aae81dc1d98f85c6be92dc38ec9d273
File Path: C:\Windows\System32\Microsoft.Uev.MonitorSyncProvider.dll
MD5: 561ebe72abc6fab2e9838b2a92b39b8f
SHA1: d22b5a52160edb6f5bca11df8dcff89f79defac8
SHA256:9f59e57299783c705199e53e869c69c03aeca068b5ea8f6db5cf53cc50fa2f4b
File Path: C:\Windows\System32\Microsoft.Uev.Office2010CustomActions.dll
MD5: 23155ad4d4881561da7ed8885322caae
SHA1: 72beff0f89ef804d69d9f2a6fb6a34e4f14938ce
SHA256:38e7ee6bdfa2d47425535a139bbf06bd5a3313f11a1648f6f9fd310a3da05c57
The Graphics component in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows attackers to execute arbitrary code via a crafted True Type font, aka "True Type Font Parsing Elevation of Privilege Vulnerability."CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Heap-based buffer overflow in Object Linking and Embedding (OLE) Automation in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, Office 2004 for Mac, and Visual basic 6.0 SP6 allows remote attackers to execute arbitrary code via a crafted script request.CWE-94 Improper Control of Generation of Code ('Code Injection')
Vulnerable Software & Versions: (show all)
The RichEdit component in Microsoft Windows 2000 SP4, XP SP2, and 2003 SP1; Office 2000 SP3, XP SP3, 2003 SP2, and Office 2004 for Mac; and Learning Essentials for Microsoft Office 1.0, 1.1, and 1.5 allows user-assisted remote attackers to execute arbitrary code via a malformed OLE object in an RTF file, which triggers memory corruption.NVD-CWE-Other
Vulnerable Software & Versions: (show all)
MSO.DLL in Microsoft Office 2000, Office XP (2002), and Office 2003 allows user-assisted attackers to cause a denial of service and execute arbitrary code via multiple attack vectors, as originally demonstrated using a crafted document record with a malformed string, as demonstrated by replacing a certain "01 00 00 00" byte sequence with an "FF FF FF FF" byte sequence, possibly causing an invalid array index, in (1) an Excel .xls document, which triggers an access violation in ole32.dll; (2) an Excel .xlw document, which triggers an access violation in excel.exe; (3) a Word document, which triggers an access violation in mso.dll in winword.exe; and (4) a PowerPoint document, which triggers an access violation in powerpnt.txt. NOTE: after the initial disclosure, this issue was demonstrated by triggering an integer overflow using an inconsistent size for a Unicode "Sheet Name" string.CWE-94 Improper Control of Generation of Code ('Code Injection')
Vulnerable Software & Versions: (show all)
Unspecified vulnerability in PowerPoint in Microsoft Office 2000, Office XP and Office 2003 allows user-assisted attackers to execute arbitrary code via a crafted record in a PPT file, as exploited by malware such as Exploit:Win32/Controlppt.W, Exploit:Win32/Controlppt.X, and Exploit-PPT.d/Trojan.PPDropper.F. NOTE: it has been reported that the attack vector involves SlideShowWindows.View.GotoNamedShow.CWE-94 Improper Control of Generation of Code ('Code Injection')
Vulnerable Software & Versions: (show all)
CISA Known Exploited Vulnerability:Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via crafted RTF data, aka "RTF Stack Buffer Overflow Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via an Office document containing an Office Art Drawing record with crafted msofbtSp records and unspecified flags, which triggers memory corruption, aka "Office Art Drawing Records Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via a crafted Office document that triggers memory corruption, aka "Drawing Exception Handling Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Untrusted search path vulnerability in Microsoft Office 2007 SP2 and 2010 allows local users to gain privileges via a Trojan horse DLL in the current working directory, aka "Insecure Library Loading Vulnerability." NOTE: this might overlap CVE-2010-3141 and CVE-2010-3142.NVD-CWE-Other
Vulnerable Software & Versions: (show all)
Microsoft Office 2007 SP2, and 2010 Gold and SP1, does not initialize an unspecified object pointer during the opening of Word documents, which allows remote attackers to execute arbitrary code via a crafted document, aka "Office Uninitialized Object Pointer Vulnerability."CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
Use-after-free vulnerability in Microsoft Office 2007 SP2 and SP3, Office 2010 Gold and SP1, and Office for Mac 2011 allows remote attackers to execute arbitrary code via a crafted Word document, aka "Word Use After Free Vulnerability."CWE-399 Resource Management Errors
Vulnerable Software & Versions: (show all)
Array index error in Microsoft Excel 2003 SP3 and 2007 SP2; Excel in Office 2007 SP2; Excel 2010 Gold and SP1; Excel in Office 2010 Gold and SP1; Office 2004, 2008, and 2011 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 allows remote attackers to execute arbitrary code via a crafted spreadsheet, aka "Excel Out of Bounds Array Indexing Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Excel 2003 SP3 and 2007 SP2; Excel in Office 2007 SP2; Excel 2010 Gold and SP1; Excel in Office 2010 Gold and SP1; Office 2004, 2008, and 2011 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2; Excel Services on Office SharePoint Server 2007 SP2; Excel Services on Office SharePoint Server 2010 Gold and SP1; and Excel Web App 2010 Gold and SP1 do not properly parse conditional expressions associated with formatting requirements, which allows remote attackers to execute arbitrary code via a crafted spreadsheet, aka "Excel Conditional Expression Parsing Vulnerability."CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
CISA Known Exploited Vulnerability:The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web Components SP3; SQL Server 2000 SP4, 2005 SP4, and 2008 SP2, SP3, and R2; BizTalk Server 2002 SP1; Commerce Server 2002 SP4, 2007 SP2, and 2009 Gold and R2; Visual FoxPro 8.0 SP1 and 9.0 SP2; and Visual Basic 6.0 Runtime allow remote attackers to execute arbitrary code via a crafted (a) web site, (b) Office document, or (c) .rtf file that triggers "system state" corruption, as exploited in the wild in April 2012, aka "MSCOMCTL.OCX RCE Vulnerability."CWE-94 Improper Control of Generation of Code ('Code Injection')
Vulnerable Software & Versions: (show all)
Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview; Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Silverlight 4 before 4.1.10329; and Silverlight 5 before 5.1.10411 allow remote attackers to execute arbitrary code via a crafted TrueType font (TTF) file, aka "TrueType Font Parsing Vulnerability."CWE-399 Resource Management Errors
Vulnerable Software & Versions: (show all)
GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2 and Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1 does not properly validate record types in EMF images, which allows remote attackers to execute arbitrary code via a crafted image, aka "GDI+ Record Type Vulnerability."CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
CISA Known Exploited Vulnerability:The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office 2003 SP3, Office 2003 Web Components SP3, Office 2007 SP2 and SP3, Office 2010 SP1, SQL Server 2000 SP4, SQL Server 2005 SP4, SQL Server 2008 SP2, SP3, R2, R2 SP1, and R2 SP2, Commerce Server 2002 SP4, Commerce Server 2007 SP2, Commerce Server 2009 Gold and R2, Host Integration Server 2004 SP1, Visual FoxPro 8.0 SP1, Visual FoxPro 9.0 SP2, and Visual Basic 6.0 Runtime allows remote attackers to execute arbitrary code via a crafted (1) document or (2) web page that triggers system-state corruption, aka "MSCOMCTL.OCX RCE Vulnerability."CWE-94 Improper Control of Generation of Code ('Code Injection')
Vulnerable Software & Versions: (show all)
Microsoft Office 2007 SP2 and SP3 and 2010 SP1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Computer Graphics Metafile (CGM) file, aka "CGM File Format Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Stack-based buffer overflow in Microsoft Office 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT allows remote attackers to execute arbitrary code via a crafted WordPerfect document (.wpd) file, aka "Word Stack Buffer Overwrite Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5; Silverlight 5 before 5.1.20513.0; win32k.sys in the kernel-mode drivers, and GDI+, DirectWrite, and Journal, in Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT; GDI+ in Office 2003 SP3, 2007 SP3, and 2010 SP1; GDI+ in Visual Studio .NET 2003 SP1; and GDI+ in Lync 2010, 2010 Attendee, 2013, and Basic 2013 allow remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file, aka "TrueType Font Parsing Vulnerability."CWE-94 Improper Control of Generation of Code ('Code Injection')
Vulnerable Software & Versions: (show all)
Microsoft Excel 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Office 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Office for Mac 2011; Excel Viewer; Office Compatibility Pack SP3; and Excel Services and Word Automation Services in SharePoint Server 2013 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Excel Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
CISA Known Exploited Vulnerability:GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2; Office 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Lync 2010, 2010 Attendee, 2013, and Basic 2013 allows remote attackers to execute arbitrary code via a crafted TIFF image, as demonstrated by an image in a Word document, and exploited in the wild in October and November 2013.CWE-94 Improper Control of Generation of Code ('Code Injection')
Vulnerable Software & Versions: (show all)
Untrusted search path vulnerability in Microsoft Office 2007 SP3, 2010 SP1 and SP2, and 2013 Gold, SP1, RT, and RT SP1, when the Simplified Chinese Proofing Tool is enabled, allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .docx file, aka "Microsoft Office Chinese Grammar Checking Vulnerability."NVD-CWE-Other
Vulnerable Software & Versions: (show all)
Microsoft Office 2007 SP3, Word 2007 SP3, Office 2010 SP1 and SP2, Word 2010 SP1 and SP2, Office for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP1 and SP2, and Word Web Apps 2010 Gold, SP1, and SP2 allow remote attackers to execute arbitrary code via crafted properties in a Word document, aka "Microsoft Word File Format Vulnerability."CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
Use-after-free vulnerability in Microsoft Office 2010 SP2, Office 2013 Gold and SP1, Office 2013 RT Gold and SP1, Office for Mac 2011, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 Gold and SP1, and Office Web Apps 2010 SP2 and 2013 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Use After Free Word Remote Code Execution Vulnerability."NVD-CWE-Other
Vulnerable Software & Versions: (show all)
Use-after-free vulnerability in Microsoft Office 2007 SP3; 2010 SP2; 2013 Gold, SP1, and SP2; and 2013 RT Gold and SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability."NVD-CWE-Other
Vulnerable Software & Versions: (show all)
Microsoft Excel 2007 SP3; the proofing tools in Office 2010 SP2; Excel 2010 SP2; Excel 2013 Gold, SP1, and RT; Excel Viewer; and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Excel Remote Code Execution Vulnerability."CWE-399 Resource Management Errors
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word Automation Services in SharePoint Server 2010, Web Applications 2010 SP2, Word Viewer, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Office Remote Code Execution Vulnerability."CWE-399 Resource Management Errors
Vulnerable Software & Versions: (show all)
Use-after-free vulnerability in Microsoft Office 2007 SP3, Excel 2007 SP3, PowerPoint 2007 SP3, Word 2007 SP3, Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Word 2010 SP2, Office 2013 Gold and SP1, Word 2013 Gold and SP1, Office 2013 RT Gold and SP1, Word 2013 RT Gold and SP1, Excel Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Excel Services on SharePoint Server 2013 Gold and SP1, Word Automation Services on SharePoint Server 2013 Gold and SP1, Web Applications 2010 SP2, Office Web Apps Server 2010 SP2, Web Apps Server 2013 Gold and SP1, SharePoint Server 2007 SP3, Windows SharePoint Services 3.0 SP3, SharePoint Foundation 2010 SP2, SharePoint Server 2010 SP2, SharePoint Foundation 2013 Gold and SP1, and SharePoint Server 2013 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability."NVD-CWE-Other
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 Gold and SP1, Word 2013 RT Gold and SP1, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 Gold and SP1, Web Applications 2010 SP2, and Web Apps Server 2013 Gold and SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted RTF document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-399 Resource Management Errors
Vulnerable Software & Versions: (show all)
CISA Known Exploited Vulnerability:Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps Server 2010 SP2 and 2013 SP1 allow remote attackers to execute arbitrary code via a crafted RTF document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-399 Resource Management Errors
Vulnerable Software & Versions: (show all)
CISA Known Exploited Vulnerability:Microsoft Office 2007 SP3, 2010 SP2, and 2013 SP1 allows remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Use-after-free vulnerability in Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps Server 2010 SP2 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability."NVD-CWE-Other
Vulnerable Software & Versions: (show all)
Use-after-free vulnerability in Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps Server 2010 SP2 and 2013 SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability."NVD-CWE-Other
Vulnerable Software & Versions: (show all)
CISA Known Exploited Vulnerability:The Windows DirectWrite library, as used in Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2; Office 2007 SP3 and 2010 SP2; Live Meeting 2007 Console; Lync 2010; Lync 2010 Attendee; Lync 2013 SP1; Lync Basic 2013 SP1; Silverlight 5 before 5.1.40416.00; and Silverlight 5 Developer Runtime before 5.1.40416.00, allows remote attackers to execute arbitrary code via a crafted TrueType font, aka "TrueType Font Parsing Vulnerability."CWE-19 Data Processing Errors
Vulnerable Software & Versions: (show all)
Microsoft Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Word 2010 SP2, Office 2013 SP1, Excel 2013 SP1, PowerPoint 2013 SP1, Word 2013 SP1, Office 2013 RT SP1, Excel 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Office for Mac 2011, Excel for Mac 2011, PowerPoint for Mac 2011, Word for Mac 2011, PowerPoint Viewer, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, Excel Services on SharePoint Server 2010 SP2 and 2013 SP1, Office Web Apps 2010 SP2, Excel Web App 2010 SP2, Office Web Apps Server 2013 SP1, SharePoint Foundation 2010 SP2, and SharePoint Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Office Compatibility Pack SP3, Office 2010 SP2, Office 2013 SP1, and Office 2013 RT SP1 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-19 Data Processing Errors
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Office for Mac 2011, and Word Viewer allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, and Word 2013 RT SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Office 2007 SP3 and 2010 SP2, Live Meeting 2007 Console, Lync 2010, Lync 2010 Attendee, Lync 2013 SP1, and Lync Basic 2013 SP1 allow remote attackers to execute arbitrary code via a crafted Office Graphics Library (OGL) font, aka "Microsoft Office Graphics Component Remote Code Execution Vulnerability."CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, Windows 10, Office 2007 SP3 and 2010 SP2, Live Meeting 2007 Console, Lync 2010, Lync 2010 Attendee, Lync 2013 SP1, Lync Basic 2013 SP1, and Silverlight before 5.1.40728 allow remote attackers to execute arbitrary code via a crafted TrueType font, aka "TrueType Font Parsing Vulnerability."CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, Windows 10, Office 2007 SP3 and 2010 SP2, Live Meeting 2007 Console, Lync 2010, Lync 2010 Attendee, Lync 2013 SP1, Lync Basic 2013 SP1, Silverlight before 5.1.40728, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, and 4.6 allow remote attackers to execute arbitrary code via a crafted TrueType font, aka "TrueType Font Parsing Vulnerability," a different vulnerability than CVE-2015-2456.CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, Windows 10, Office 2007 SP3 and 2010 SP2, Live Meeting 2007 Console, Lync 2010, Lync 2010 Attendee, Lync 2013 SP1, Lync Basic 2013 SP1, Silverlight before 5.1.40728, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, and 4.6 allow remote attackers to execute arbitrary code via a crafted TrueType font, aka "TrueType Font Parsing Vulnerability," a different vulnerability than CVE-2015-2455.CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, Office 2007 SP3 and 2010 SP2, Live Meeting 2007 Console, Lync 2010, Lync 2010 Attendee, Lync 2013 SP1, Lync Basic 2013 SP1, Silverlight before 5.1.40728, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, and 4.6 allow remote attackers to execute arbitrary code via a crafted TrueType font, aka "TrueType Font Parsing Vulnerability," a different vulnerability than CVE-2015-2464.CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, Office 2007 SP3 and 2010 SP2, Live Meeting 2007 Console, Lync 2010, Lync 2010 Attendee, Lync 2013 SP1, Lync Basic 2013 SP1, Silverlight before 5.1.40728, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, and 4.6 allow remote attackers to execute arbitrary code via a crafted TrueType font, aka "TrueType Font Parsing Vulnerability," a different vulnerability than CVE-2015-2463.CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, and 2013 RT SP1 allows remote attackers to execute arbitrary code via a crafted template, aka "Microsoft Office Remote Code Execution Vulnerability."CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Office for Mac 2011, Office for Mac 2016, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, Word Web Apps 2010 SP2, and Office Web Apps Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, and Office for Mac 2011 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Integer underflow in Microsoft Office 2007 SP3, Office 2010 SP2, Office 2013 SP1, Office 2013 RT SP1, Office for Mac 2011, and Word Viewer allows remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Integer Underflow Vulnerability."CWE-189 Numeric Errors
Vulnerable Software & Versions: (show all)
Buffer overflow in the Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2, Office 2007 SP3, Office 2010 SP2, Lync 2010, Lync 2010 Attendee, Lync 2013 SP1, Lync Basic 2013 SP1, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted OpenType font, aka "Graphics Component Buffer Overflow Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
CISA Known Exploited Vulnerability:Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, and 2013 RT SP1 allows remote attackers to execute arbitrary code via a crafted EPS image, aka "Microsoft Office Malformed EPS File Vulnerability."CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, and Word Viewer allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Office Compatibility Pack SP3, and Word Viewer allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Office 2007 SP3, Office 2010 SP2, Office 2013 SP1, Office 2013 RT SP1, Office 2016, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, Office Web Apps 2010 SP2, and Office Web Apps Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
The Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2, Office 2007 SP3, Office 2010 SP2, Word Viewer, Skype for Business 2016, Lync 2010, Lync 2013 SP1, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
The Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, Windows 10 Gold and 1511, Office 2007 SP3, Office 2010 SP2, Word Viewer, Skype for Business 2016, Lync 2010, Lync 2013 SP1, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
The Windows font library in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT Gold and 8.1; Office 2007 SP3; Office 2010 SP2; Word Viewer; .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, and 4.6; Skype for Business 2016; Lync 2010; Lync 2013 SP1; Live Meeting 2007 Console; and Silverlight 5 allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Office 2007 SP3 and Office 2010 SP2 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2016, Word 2013 RT SP1, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted email message processed by Outlook, aka "Microsoft Office RCE Vulnerability."CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
The font library in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold and 1511; Office 2007 SP3 and 2010 SP2; Word Viewer; .NET Framework 3.0 SP2, 3.5, and 3.5.1; Skype for Business 2016; Lync 2010; Lync 2010 Attendee; Lync 2013 SP1; and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
The Windows font library in Microsoft Office 2010 SP2, Word 2010 SP2, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Microsoft Office Graphics RCE Vulnerability."CWE-284 Improper Access Control
Vulnerable Software & Versions: (show all)
Uniscribe in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, Windows Server 2016, Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office Word Viewer, Microsoft Lync 2013 SP1, Skype for Business 2016, Microsoft Silverlight 5 Developer Runtime when installed on Microsoft Windows, and Microsoft Silverlight 5 when installed on Microsoft Windows allows a remote code execution vulnerability due to the way it handles objects in memory, aka "Windows Uniscribe Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8528.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 Service Pack 3, Microsoft Word 2010 Service Pack 2, Microsoft Office 2010 Service Pack 2, and Microsoft Office Compatibility Pack Service Pack 3 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Word Memory Corruption Vulnerability".CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Office when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8510, CVE-2017-8511, CVE-2017-8512, CVE-2017-0260, and CVE-2017-8506.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Office when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8509, CVE-2017-8511, CVE-2017-8512, CVE-2017-0260, and CVE-2017-8506.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Office when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8509, CVE-2017-8510, CVE-2017-8511, CVE-2017-0260, and CVE-2017-8506.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Graphics in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows a remote code execution vulnerability due to the way it handles objects in memory, aka "Windows Graphics Remote Code Execution Vulnerability".CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Uniscribe in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, Windows Server 2016, Microsoft Office 2007 SP3, and Microsoft Office 2010 SP2 allows a remote code execution vulnerability due to the way it handles objects in memory, aka "Windows Uniscribe Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0283.CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Word in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0792.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Remote Code Execution Vulnerability".NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
CISA Known Exploited Vulnerability:Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability".CWE-787 Out-of-bounds Write
Vulnerable Software & Versions: (show all)
Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Remote Code Execution Vulnerability".NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0805, CVE-2018-0806, and CVE-2018-0807.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0804, CVE-2018-0806, and CVE-2018-0807NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0804, CVE-2018-0805, and CVE-2018-0807.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0804, CVE-2018-0805, and CVE-2018-0806.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0805, CVE-2018-0806, and CVE-2018-0807.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0805, CVE-2018-0806, and CVE-2018-0807.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0805, CVE-2018-0806, and CVE-2018-0807.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists when the Office graphics component improperly handles specially crafted embedded fonts, aka "Microsoft Office Graphics Remote Code Execution Vulnerability." This affects Word, Microsoft Office, Microsoft SharePoint, Excel, Microsoft SharePoint Server.CWE-94 Improper Control of Generation of Code ('Code Injection')
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft PowerPoint software when the software fails to properly handle objects in Protected View, aka "Microsoft PowerPoint Remote Code Execution Vulnerability." This affects Office 365 ProPlus, PowerPoint Viewer, Microsoft Office, Microsoft PowerPoint.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in Protected View, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Office 365 ProPlus, Microsoft Office, Microsoft Excel.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Word software when the software fails to properly handle objects in Protected View, aka "Microsoft Word Remote Code Execution Vulnerability." This affects Microsoft SharePoint Server, Office 365 ProPlus, Microsoft Office, Microsoft Word.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
CISA Known Exploited Vulnerability:A remote code execution vulnerability exists in the way that the MSHTML engine inproperly validates input, aka "MSHTML Engine Remote Code Execution Vulnerability." This affects Microsoft Office, Microsoft Office Word Viewer, Internet Explorer 9, Internet Explorer 11, Microsoft Excel Viewer, Internet Explorer 10, Office 365 ProPlus.CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka "Microsoft Word Remote Code Execution Vulnerability." This affects Word, Microsoft Office, Microsoft Office Word Viewer, Office 365 ProPlus, Microsoft SharePoint, Microsoft Office Online Server, Microsoft Word, Microsoft SharePoint Server.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1110.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1327.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists when Microsoft Office improperly loads arbitrary type libraries, aka 'Microsoft Office Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0991.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0979.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1447, CVE-2020-1448.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1446, CVE-2020-1448.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Excel. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Excel handles objects in memory.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Excel. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Excel handles objects in memory.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Excel. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Excel handles objects in memory.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
An information disclosure vulnerability exists when Microsoft Word improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user���s computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location where the object was created. The update addresses the vulnerability by changing the way certain Word functions handle objects in memory.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Buffer overflow in the Microsoft Office MSODataSourceControl ActiveX object allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the DeleteRecordSourceIfUnused method.NVD-CWE-Other
Vulnerable Software & Versions: (show all)
Microsoft Office 2007 SP3, Office 2010 SP2, Office 2013 SP1, Office 2013 RT SP1, Office 2016, Excel for Mac 2011, PowerPoint for Mac 2011, Word for Mac 2011, Excel 2016 for Mac, PowerPoint 2016 for Mac, Word 2016 for Mac, and Word Viewer allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps Server 2013 SP1, and SharePoint Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0022.CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps Server 2013 SP1, and SharePoint Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, and 2016 does not properly sign an unspecified binary file, which allows local users to gain privileges via a Trojan horse file with a crafted signature, aka "Microsoft Office Security Feature Bypass Vulnerability."CWE-264 Permissions, Privileges, and Access Controls
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps 2010 SP2, and Office Web Apps Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, Office Web Apps 2010 SP2, and Web Apps Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Office 2007 SP3, Office 2010 SP2, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, and Word Viewer allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, and Word Viewer allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 SP1, SharePoint Server 2016, Office Web Apps 2010 SP2, Office Web Apps Server 2013 SP1, and Office Online Server allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
The Windows font library in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Windows Graphics Component RCE Vulnerability."CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
The Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Office 2007 SP3, Office 2010 SP2, Word Viewer, Skype for Business 2016, Lync 2013 SP1, Lync 2010, Lync 2010 Attendee, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Windows Graphics Component RCE Vulnerability," a different vulnerability than CVE-2016-3304.CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
The Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Office 2007 SP3, Office 2010 SP2, Word Viewer, Skype for Business 2016, Lync 2013 SP1, Lync 2010, Lync 2010 Attendee, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Windows Graphics Component RCE Vulnerability," a different vulnerability than CVE-2016-3303.CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, 2013 RT SP1, and 2016, Word 2016 for Mac, and Word Viewer allow remote attackers to execute arbitrary code via a crafted file, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Office 2010 SP2, Word 2007 SP3, Word 2010 SP2, Word for Mac 2011, Word 2016 for Mac, and Word Viewer allow remote attackers to execute arbitrary code via a crafted file, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, and 2013 RT SP1 allow remote attackers to execute arbitrary code via a crafted file, aka "Graphics Component Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Office 2007 SP3, Office 2010 SP2, Office 2013 SP1, Office 2013 RT SP1, Office 2016, Word for Mac 2011, Word 2016 for Mac, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2, SharePoint Server 2013 SP1, Excel Automation Services on SharePoint Server 2013 SP1, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps 2010 SP2, and Office Web Apps Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "GDI+ Remote Code Execution Vulnerability."CWE-264 Permissions, Privileges, and Access Controls
Vulnerable Software & Versions: (show all)
CISA Known Exploited Vulnerability:Microsoft Word 2007 SP2, Office 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps 2010 SP2, Office Web Apps Server 2013 SP1, and Office Online Server allow remote attackers to execute arbitrary code via a crafted RTF document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Word 2007, Office 2010 SP2, Word 2010 SP2, Word for Mac 2011, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Word 2007, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word for Mac 2011, Excel for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps 2010 SP2, and Office Web Apps Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Word 2007, Office 2010 SP2, Word 2010 SP2, Word for Mac 2011, Excel for Mac 2011, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Office 2007 SP3, Office 2010 SP2, Office 2013 SP1, Office 2013 RT SP1, and Office 2016 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Office 2010 SP2, 2013 SP1, 2013 RT SP1, and 2016 mishandles library loading, which allows local users to gain privileges via a crafted application, aka "Microsoft Office OLE DLL Side Loading Vulnerability."CWE-19 Data Processing Errors, CWE-264 Permissions, Privileges, and Access Controls
Vulnerable Software & Versions: (show all)
Microsoft Office 2007 SP3, Office 2010 SP2, Word Viewer, Office for Mac 2011, and Office 2016 for Mac allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Office 2010 SP2, Office Compatibility Pack SP3, Office Web Apps Server 2010 SP2, Word 2007 SP3, Word 2010 SP2, and Word Automation Services on SharePoint Server 2010 SP2 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." This vulnerability is different from those described in CVE-2017-0006, CVE-2017-0019, CVE-2017-0020, CVE-2017-0031, CVE-2017-0052, and CVE-2017-0053.CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Office 2010 SP2, Office Compatibility Pack SP3, Word 2007 SP3, and Word 2010 SP2 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." This vulnerability is different from those described in CVE-2017-0006, CVE-2017-0019, CVE-2017-0020, CVE-2017-0030, CVE-2017-0052, and CVE-2017-0053.CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Office 2010 SP2, Office Compatibility Pack SP3, Word 2007 SP3, Word 2010 SP2, Word 2013 SP1, Word 2013 R2 SP1, Word 2016, and Word Viewer allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." This vulnerability is different from those described in CVE-2017-0006, CVE-2017-0019, CVE-2017-0020, CVE-2017-0030, CVE-2017-0031, and CVE-2017-0052.CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
The Windows Graphics Component in Microsoft Office 2007 SP3; 2010 SP2; and Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Live Meeting 2007; Silverlight 5; Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka "Graphics Component Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0014.CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
CISA Known Exploited Vulnerability:Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API."NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8570.CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Word 2007, Office 2010 SP2, Word 2010 SP2, Office Compatibility Pack SP3, Office for Mac 2011, Office for Mac 2016, Microsoft Office Web Apps 2010 SP2, Office Web Apps Server 2013 SP1, Word 2013 RT SP1, Word 2013 SP1, Word Automation Services on Microsoft SharePoint Server 2013 SP1, Office Word Viewer, SharePoint Enterprise Server 2016, and Word 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-0264 and CVE-2017-0265.CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
CISA Known Exploited Vulnerability:Microsoft Office 2010 SP2, Office 2013 SP1, and Office 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0262 and CVE-2017-0281.CWE-416 Use After Free
Vulnerable Software & Versions: (show all)
CISA Known Exploited Vulnerability:Microsoft Office 2010 SP2, Office 2013 SP1, and Office 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0261 and CVE-2017-0281.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Microsoft Office 2007 SP3, Office 2010 SP2, Office 2013 SP1, Office 2016, Office Online Server 2016, Office Web Apps 2010 SP2,Office Web Apps 2013 SP1, Project Server 2013 SP1, SharePoint Enterprise Server 2013 SP1, SharePoint Enterprise Server 2016, SharePoint Foundation 2013 SP1, Sharepoint Server 2010 SP2, Word 2016, and Skype for Business 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0261 and CVE-2017-0262.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
CISA Known Exploited Vulnerability:Microsoft Office 2010, SharePoint Enterprise Server 2010, SharePoint Server 2010, Web Applications, Office Web Apps Server 2010 and 2013, Word Viewer, Word 2007, 2010, 2013 and 2016, Word Automation Services, and Office Online Server allow remote code execution when the software fails to properly handle objects in memory.CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
CISA Known Exploited Vulnerability:Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11884.CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Office when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8509, CVE-2017-8510, CVE-2017-8512, CVE-2017-0260, and CVE-2017-8506.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
CISA Known Exploited Vulnerability:Microsoft Office allows a remote code execution vulnerability due to the way that it handles objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0243.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Excel Services, Microsoft Excel 2007 Service Pack 3, Microsoft Excel 2010 Service Pack 2, Microsoft Excel 2013 Service Pack 1, Microsoft Excel 2013 RT Service Pack 1, and Microsoft Excel 2016 when they fail to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8630, CVE-2017-8632, and CVE-2017-8731.CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
Microsoft Outlook 2007, Microsoft Outlook 2010 and Microsoft Outlook 2013 allow a remote code execution vulnerability due to the way email messages are parsed, aka "Microsoft Outlook Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0791.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way RTF content is handled, aka "Microsoft Word Memory Corruption Vulnerability".CWE-787 Out-of-bounds Write
Vulnerable Software & Versions: (show all)
CISA Known Exploited Vulnerability:Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE is unique from CVE-2018-0797 and CVE-2018-0812.CWE-787 Out-of-bounds Write
Vulnerable Software & Versions: (show all)
Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Memory Corruption Vulnerability".CWE-787 Out-of-bounds Write
Vulnerable Software & Versions: (show all)
Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0805, CVE-2018-0806, and CVE-2018-0807.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Microsoft Office 2010 SP2, 2013 SP1, and 2016, Microsoft Office 2016 Click-to-Run Microsoft Office 2016 for Mac, Microsoft Office Compatibility Pack SP2, Microsoft Office Web Apps 2010 SP2, Microsoft Office Web Apps 2013 SP1, Microsoft Office Word Viewer, Microsoft SharePoint Enterprise Server 2013 SP1, Microsoft SharePoint Enterprise Server 2016, Microsoft Office Compatibility Pack SP2, Microsoft Online Server 2016, Microsoft SharePoint Server 2010 SP2, Microsoft Word 2007 SP3, Microsoft Word 2010 SP2, Word 2013 and Microsoft Word 2016 allow a remote code execution vulnerability due to how objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability".CWE-787 Out-of-bounds Write
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Microsoft Office, Microsoft Excel. This CVE ID is unique from CVE-2018-8148, CVE-2018-8162.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Microsoft Office, Microsoft Excel. This CVE ID is unique from CVE-2018-8147, CVE-2018-8162.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability." This affects Microsoft Office. This CVE ID is unique from CVE-2018-8158, CVE-2018-8161.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability." This affects Microsoft Office. This CVE ID is unique from CVE-2018-8157, CVE-2018-8161.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability." This affects Microsoft Word, Word, Microsoft Office, Microsoft SharePoint. This CVE ID is unique from CVE-2018-8157, CVE-2018-8158.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Microsoft Office.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka "Microsoft Word Remote Code Execution Vulnerability." This affects Microsoft SharePoint Server, Microsoft Office. This CVE ID is unique from CVE-2018-8573.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka "Microsoft Word Remote Code Execution Vulnerability." This affects Microsoft Word, Office 365 ProPlus, Microsoft Office. This CVE ID is unique from CVE-2018-8539.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Microsoft Office, Office 365 ProPlus, Microsoft Excel, Microsoft Excel Viewer, Excel. This CVE ID is unique from CVE-2018-8574.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Outlook software when it fails to properly handle objects in memory, aka "Microsoft Outlook Remote Code Execution Vulnerability." This affects Office 365 ProPlus, Microsoft Office, Microsoft Outlook.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Office 365 ProPlus, Microsoft Office, Microsoft Excel. This CVE ID is unique from CVE-2018-8636.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka "Jet Database Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0575, CVE-2019-0576, CVE-2019-0577, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0583, CVE-2019-0584.NVD-CWE-noinfo
Vulnerable Software & Versions:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka "Jet Database Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0575, CVE-2019-0576, CVE-2019-0577, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0583, CVE-2019-0584.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0672, CVE-2019-0673, CVE-2019-0674, CVE-2019-0675.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0671, CVE-2019-0673, CVE-2019-0674, CVE-2019-0675.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0671, CVE-2019-0672, CVE-2019-0674, CVE-2019-0675.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0671, CVE-2019-0672, CVE-2019-0673, CVE-2019-0675.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0671, CVE-2019-0672, CVE-2019-0673, CVE-2019-0674.NVD-CWE-noinfo
Vulnerable Software & Versions:
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'.NVD-CWE-noinfo
Vulnerable Software & Versions:
A remote code execution vulnerability exists when Microsoft Office fails to properly handle certain files.To exploit the vulnerability, an attacker would have to convince a user to open a specially crafted URL file that points to an Excel or PowerPoint file that was also downloaded.The update addresses the vulnerability by correcting how Office handles these files., aka 'Office Remote Code Execution Vulnerability'.CWE-19 Data Processing Errors
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0824, CVE-2019-0825, CVE-2019-0826, CVE-2019-0827.NVD-CWE-noinfo
Vulnerable Software & Versions:
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0823, CVE-2019-0825, CVE-2019-0826, CVE-2019-0827.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0823, CVE-2019-0824, CVE-2019-0826, CVE-2019-0827.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0823, CVE-2019-0824, CVE-2019-0825, CVE-2019-0827.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0823, CVE-2019-0824, CVE-2019-0825, CVE-2019-0826.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0946, CVE-2019-0947.CWE-19 Data Processing Errors
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0945, CVE-2019-0947.CWE-19 Data Processing Errors
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0945, CVE-2019-0946.CWE-19 Data Processing Errors
Vulnerable Software & Versions:
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1035.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. The file could then take actions on behalf of the logged-on user with the same permissions as the current user. To exploit the vulnerability, a user must open a specially crafted file with an affected version of Microsoft Word software. Two possible email attack scenarios exist for this vulnerability: ��� With the first email attack scenario, an attacker could send a specially crafted email message to the user and wait for the user to click on the message. When the message renders via Microsoft Word in the Outlook Preview Pane, an attack could be triggered. ��� With the second scenario, an attacker could attach a specially crafted file to an email, send it to a user, and convince them to open it. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or other message, and then convince the user to open the specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Word handles files in memory. For users who view their emails in Outlook, the Preview Pane attack vector can be mitigated by disabling this feature. The following registry keys can be set to disable the Preview Pane in Outlook on Windows, either via manual editing of the registry or by modifying Group Policy. Note Using Registry Editor incorrectly can cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk. For information about how to edit the registry, view the "Changing Keys and Values" Help topic in Registry Editor (Regedit.exe) or view the "Add and Delete Information in the Registry" and "Edit Registry Data" Help topics in Regedt32.exe. Outlook 2010: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Outlook\Options DWORD: DisableReadingPane Value: 1 Outlook 2013: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Options DWORD: DisableReadingPane Value: 1 Outlook 2016, Outlook 2019, and Office 365 ProPlus: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Options DWORD: DisableReadingPane Value: 1NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1240, CVE-2019-1241, CVE-2019-1242, CVE-2019-1243, CVE-2019-1247, CVE-2019-1248, CVE-2019-1249, CVE-2019-1250.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A security feature bypass vulnerability exists when Microsoft Office improperly handles input, aka 'Microsoft Office Security Feature Bypass Vulnerability'.CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0850, CVE-2020-0851, CVE-2020-0852, CVE-2020-0855.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka 'Microsoft Office Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0760.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
<p>A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.</p> <p>Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Excel. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.</p> <p>The security update addresses the vulnerability by correcting how Microsoft Excel handles objects in memory.</p>NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
<p>A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user with the same permissions as the current user.</p> <p>To exploit the vulnerability, a user must open a specially crafted file with an affected version of Microsoft Word software. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file.</p> <p>The security update addresses the vulnerability by correcting how Microsoft Word handles files in memory.</p>NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
<p>A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.</p> <p>Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Excel. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.</p> <p>The security update addresses the vulnerability by correcting how Microsoft Excel handles objects in memory.</p>NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Project software when the software fails to check the source markup of a file, aka 'Microsoft Project Remote Code Execution Vulnerability'.CWE-346 Origin Validation Error
Vulnerable Software & Versions: (show all)
A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Office. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. The security update addresses the vulnerability by correcting how Microsoft Office handles objects in memory.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
<p>A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.</p> <p>Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Excel. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.</p> <p>The security update addresses the vulnerability by correcting how Microsoft Excel handles objects in memory.</p>CWE-416 Use After Free
Vulnerable Software & Versions: (show all)
<p>A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.</p> <p>Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Office. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.</p> <p>The security update addresses the vulnerability by correcting how Microsoft Office handles objects in memory.</p>NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Microsoft Excel Remote Code Execution VulnerabilityCWE-415 Double Free
Vulnerable Software & Versions:
Microsoft Office Access Connectivity Engine Remote Code Execution VulnerabilityNVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Microsoft Excel Remote Code Execution VulnerabilityNVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Microsoft Excel Remote Code Execution VulnerabilityNVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Microsoft Excel Remote Code Execution VulnerabilityNVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Microsoft Office Remote Code Execution VulnerabilityNVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Microsoft Excel Remote Code Execution VulnerabilityNVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Microsoft Word Remote Code Execution VulnerabilityCWE-787 Out-of-bounds Write
Vulnerable Software & Versions: (show all)
Microsoft Word Remote Code Execution VulnerabilityNVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Microsoft Office Remote Code Execution VulnerabilityNVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Microsoft Excel Remote Code Execution VulnerabilityNVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Microsoft Office Remote Code Execution VulnerabilityNVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Microsoft Office Remote Code Execution VulnerabilityNVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Microsoft Excel Remote Code Execution VulnerabilityCWE-416 Use After Free
Vulnerable Software & Versions: (show all)
CISA Known Exploited Vulnerability:Microsoft Office Remote Code Execution VulnerabilityNVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Buffer overflow in Microsoft Office XP allows remote attackers to execute arbitrary code via a link with a URL file location containing long inputs after (1) "%00 (null byte) in .doc filenames or (2) "%0a" (carriage return) in .rtf filenames.NVD-CWE-Other
Vulnerable Software & Versions: (show all)
Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the "COM Object Instantiation Memory Corruption vulnerability."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
The Windows Graphics Component in Microsoft Office 2010 SP2; Windows Server 2008 R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via a crafted web site, aka "Windows Graphics Component Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0108.NVD-CWE-noinfo
Vulnerable Software & Versions:
Windows Uniscribe in Microsoft Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Office 2007 SP3; Office 2010 SP2; Word Viewer; Office for Mac 2011 and 2016; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Add-in and Console allows an attacker to execute code remotely via a specially crafted website or a specially crafted document or email attachment, aka "Microsoft Graphics Component Remote Code Execution."CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Vulnerable Software & Versions: (show all)
A tampering vulnerability exists when Microsoft Outlook does not properly handle specific attachment types when rendering HTML emails, aka "Microsoft Office Tampering Vulnerability." This affects Microsoft Word, Microsoft Office.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Office 2016, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps 2010 SP2, Office Web Apps Server 2013 SP1, and Office Online Server allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Office Compatibility Pack SP3, Word Viewer, Word for Mac 2011, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via a crafted document, aka "Microsoft Office Information Disclosure Vulnerability."CWE-125 Out-of-bounds Read
Vulnerable Software & Versions: (show all)
Microsoft Office 2007 SP3, Office 2010 SP2, Office 2013 SP1, Office for Mac 2011, and Office 2016 for Mac allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via a crafted document, aka "Microsoft Office Information Disclosure Vulnerability."CWE-125 Out-of-bounds Read
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Office Compatibility Pack SP3, Word for Mac 2011, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via a crafted document, aka "Microsoft Office Information Disclosure Vulnerability," a different vulnerability than CVE-2016-7291.CWE-125 Out-of-bounds Read
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Office Compatibility Pack SP3, Word for Mac 2011, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via a crafted document, aka "Microsoft Office Information Disclosure Vulnerability," a different vulnerability than CVE-2016-7290.CWE-125 Out-of-bounds Read
Vulnerable Software & Versions: (show all)
Untrusted search path vulnerability in VBE6.dll in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Microsoft Visual Basic for Applications (VBA); and Summit Microsoft Visual Basic for Applications SDK allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .docx file, aka "Visual Basic for Applications Insecure Library Loading Vulnerability," as exploited in the wild in July 2012.NVD-CWE-Other
Vulnerable Software & Versions: (show all)
Microsoft Pinyin IME 2010, when used in conjunction with Microsoft Office 2010 SP1, does not properly restrict configuration options, which allows local users to gain privileges by starting Internet Explorer from the IME toolbar, aka "Chinese IME Vulnerability."CWE-264 Permissions, Privileges, and Access Controls
Vulnerable Software & Versions: (show all)
The MSCOMCTL library in Microsoft Office 2007 SP3, 2010 SP1 and SP2, and 2013 Gold, SP1, RT, and RT SP1 makes it easier for remote attackers to bypass the ASLR protection mechanism via a crafted web site, as exploited in the wild in May 2014, aka "MSCOMCTL ASLR Vulnerability."CWE-264 Permissions, Privileges, and Access Controls
Vulnerable Software & Versions: (show all)
The Visual Basic macros in Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, and 2016 export a certificate-store private key during a document-save operation, which allows attackers to obtain sensitive information via unspecified vectors, aka "Microsoft Information Disclosure Vulnerability."CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
Microsoft Word 2007, Office 2010 SP2, Word 2010 SP2, Word for Mac 2011, Excel for Mac 2011, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2013 SP1, and Office Web Apps 2010 SP2 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via a crafted Office document, aka "Microsoft Office Information Disclosure Vulnerability."CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
Graphics in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, Windows Server 2016, Microsoft Office 2007 Service Pack 3, and Microsoft Office 2010 Service Pack 2 allows improper disclosure of memory contents, aka "Graphics Uniscribe Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0286, CVE-2017-0287, CVE-2017-0288, CVE-2017-0289, CVE-2017-8532, and CVE-2017-8533.CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
Graphics in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows improper disclosure of memory contents, aka "Graphics Uniscribe Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0286, CVE-2017-0287, CVE-2017-0288, CVE-2017-0289, CVE-2017-8531, and CVE-2017-8533.CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
Graphics in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows improper disclosure of memory contents, aka "Graphics Uniscribe Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0286, CVE-2017-0287, CVE-2017-0288, CVE-2017-0289, CVE-2017-8531, and CVE-2017-8532.CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
Uniscribe in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, Windows Server 2016, Microsoft Office 2007 SP3, and Microsoft Office 2010 SP2 allows improper disclosure of memory contents, aka "Windows Uniscribe Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0282, CVE-2017-0284, and CVE-2017-0285.CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
An information disclosure vulnerability exists when Office renders Rich Text Format (RTF) email messages containing OLE objects when a message is opened or previewed, aka "Microsoft Office Information Disclosure Vulnerability." This affects Microsoft Word, Microsoft Office. This CVE ID is unique from CVE-2018-1007.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
An information disclosure vulnerability exists in Outlook when a message is opened, aka "Microsoft Outlook Information Disclosure Vulnerability." This affects Word, Microsoft Office.CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory, aka 'Microsoft Excel Information Disclosure Vulnerability'.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
An information disclosure vulnerability exists when Exchange allows creation of entities with Display Names having non-printable characters. An authenticated attacker could exploit this vulnerability by creating entities with invalid display names, which, when added to conversations, remain invisible. This security update addresses the issue by validating display names upon creation in Microsoft Exchange, and by rendering invalid display names correctly in Microsoft Outlook clients., aka 'Microsoft Exchange Information Disclosure Vulnerability'.CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
A denial of service vulnerability exists in Microsoft Word software when the software fails to properly handle objects in memory, aka 'Microsoft Word Denial of Service Vulnerability'.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
The CERN Image Map Dispatcher (htimage.exe) in Microsoft FrontPage allows remote attackers to determine the existence, and possibly partial contents, of arbitrary files under the web root via a relative pathname in the PATH_INFO.NVD-CWE-Other
Vulnerable Software & Versions: (show all)
Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; Live Meeting 2007 Console; .NET Framework 3.0 SP2, 3.5, 3.5.1, 4.5.2, and 4.6; and Silverlight 5 allows remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka "True Type Font Parsing Information Disclosure Vulnerability."CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps 2010 SP2, and Office Web Apps Server 2013 SP1 allow remote attackers to obtain sensitive information from process memory via a crafted Office document, aka "Microsoft Office Information Disclosure Vulnerability."CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka "GDI+ Information Disclosure Vulnerability," a different vulnerability than CVE-2016-3263.CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka "GDI+ Information Disclosure Vulnerability," a different vulnerability than CVE-2016-3262.CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
Microsoft Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Word 2010 SP2, Excel 2013 SP1, PowerPoint 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Excel 2016, Word 2016, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 allow remote attackers to execute arbitrary code via a crafted XLA file, aka "Microsoft Office Remote Code Execution Vulnerability."CWE-254 7PK - Security Features
Vulnerable Software & Versions: (show all)
Microsoft Office 2010 SP2, Word 2010 SP2, Word 2013 RT SP1, and Word 2016 allow remote attackers to cause a denial of service (application hang) via a crafted Office document, aka "Microsoft Office Denial of Service Vulnerability."NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "GDI+ Information Disclosure Vulnerability." This vulnerability is different from those described in CVE-2017-0060 and CVE-2017-0062.CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 allow remote attackers to obtain sensitive information from out-of-bound memory via a crafted Office document, aka "Microsoft Office Information Disclosure Vulnerability."CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory, aka "Microsoft Excel Information Disclosure Vulnerability." This affects Microsoft Excel Viewer, Microsoft Office, Microsoft Excel.CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
An information disclosure vulnerability exists when Microsoft Office software reads out of bound memory due to an uninitialized variable, which could disclose the contents of memory, aka "Microsoft Office Information Disclosure Vulnerability." This affects Word, Microsoft SharePoint Server, Microsoft Office Word Viewer, Microsoft Excel Viewer, Microsoft SharePoint, Microsoft Office.CWE-125 Out-of-bounds Read, CWE-908 Use of Uninitialized Resource
Vulnerable Software & Versions: (show all)
An information disclosure vulnerability exists when Microsoft Excel software reads out of bound memory due to an uninitialized variable, which could disclose the contents of memory, aka "Microsoft Excel Information Disclosure Vulnerability." This affects Microsoft Office, Office 365 ProPlus, Microsoft Excel, Microsoft Excel Viewer, Excel. This CVE ID is unique from CVE-2018-8598.CWE-908 Use of Uninitialized Resource
Vulnerable Software & Versions: (show all)
A security feature bypass vulnerability exists when Microsoft Office does not validate URLs.An attacker could send a victim a specially crafted file, which could trick the victim into entering credentials, aka 'Microsoft Office Security Feature Bypass Vulnerability'.CWE-601 URL Redirection to Untrusted Site ('Open Redirect')
Vulnerable Software & Versions: (show all)
An information disclosure vulnerability exists when Microsoft Word macro buttons are used improperly, aka "Microsoft Word Information Disclosure Vulnerability." This affects Microsoft Word, Office 365 ProPlus, Microsoft Office, Word.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
An information disclosure vulnerability exists in Microsoft Access software when the software fails to properly handle objects in memory, aka 'Microsoft Access Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1463.CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
An information disclosure vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka 'Microsoft Office Information Disclosure Vulnerability'.CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory, aka 'Microsoft Excel Information Disclosure Vulnerability'.CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
An information disclosure vulnerability exists in Microsoft Access software when the software fails to properly handle objects in memory, aka 'Microsoft Access Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1400.CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory, aka 'Microsoft Excel Information Disclosure Vulnerability'.CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
An information disclosure vulnerability exists when Microsoft Office software reads out of bound memory due to an uninitialized variable, which could disclose the contents of memory, aka 'Microsoft Office Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-1445.CWE-125 Out-of-bounds Read, CWE-908 Use of Uninitialized Resource
Vulnerable Software & Versions: (show all)
An information disclosure vulnerability exists when Microsoft Office improperly discloses the contents of its memory, aka 'Microsoft Office Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-1342.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user���s computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location where the object was created. The update addresses the vulnerability by changing the way certain Excel functions handle objects in memory.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
An information disclosure vulnerability exists when Microsoft Word improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user���s computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location where the object was created. The update addresses the vulnerability by changing the way certain Word functions handle objects in memory.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
Windows Uniscribe in Microsoft Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, 1607, 1703, and Server 2016; Office 2007 SP3; Office 2010 SP2; Word Viewer; Office for Mac 2011 and 2016; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Add-in and Console allows an attacker to obtain information to further compromise a user's system via a specially crafted document or an untrusted webpage, aka "Graphics Component Information Disclosure Vulnerability."CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
The XML parser in Microsoft Office 2007 SP3, 2010 SP1 and SP2, and 2013, and Office for Mac 2011, does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory consumption and persistent application hang) via a crafted XML document containing a large number of nested entity references, as demonstrated by a crafted text/plain e-mail message to Outlook, a similar issue to CVE-2003-1564.CWE-399 Resource Management Errors
Vulnerable Software & Versions: (show all)
Uniscribe in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, Windows Server 2016, Microsoft Office 2007 SP3, and Microsoft Office 2010 SP2 allows improper disclosure of memory contents, aka "Windows Uniscribe Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0284, CVE-2017-0285, and CVE-2017-8534.CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
Uniscribe in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, Windows Server 2016, Microsoft Office 2007 SP3, and Microsoft Office 2010 SP2 allows improper disclosure of memory contents, aka "Windows Uniscribe Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0282, CVE-2017-0285, and CVE-2017-8534.CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
Uniscribe in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, Windows Server 2016, Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, and Microsoft Office Word Viewer allows improper disclosure of memory contents, aka "Windows Uniscribe Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0282, CVE-2017-0284, and CVE-2017-8534.CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
Graphics in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows improper disclosure of memory contents, aka "Windows Graphics Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0287, CVE-2017-0288, CVE-2017-0289, CVE-2017-8531, CVE-2017-8532, and CVE-2017-8533.CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
Graphics in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows improper disclosure of memory contents, aka "Graphics Uniscribe Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0286, CVE-2017-0288, CVE-2017-0289, CVE-2017-8531, CVE-2017-8532, and CVE-2017-8533.CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
Graphics in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows improper disclosure of memory contents, aka "Windows Graphics Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0286, CVE-2017-0287, CVE-2017-0289, CVE-2017-8531, CVE-2017-8532, and CVE-2017-8533.CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
Graphics in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows improper disclosure of memory contents, aka "Windows Graphics Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-0286, CVE-2017-0287, CVE-2017-0288, CVE-2017-8531, CVE-2017-8532, and CVE-2017-8533.CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
hxds.dll in Microsoft Office 2007 SP3 and 2010 SP1 and SP2 does not implement the ASLR protection mechanism, which makes it easier for remote attackers to execute arbitrary code via a crafted COM component on a web site that is visited with Internet Explorer, as exploited in the wild in December 2013, aka "HXDS ASLR Vulnerability."CWE-264 Permissions, Privileges, and Access Controls
Vulnerable Software & Versions: (show all)
Use-after-free vulnerability in Microsoft Office 2007 SP3, 2010 SP2, and 2013 Gold and SP1 allows remote attackers to bypass the ASLR protection mechanism via a crafted document, aka "Microsoft Office Component Use After Free Vulnerability."NVD-CWE-Other
Vulnerable Software & Versions: (show all)
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, Windows 10, Excel 2007 SP3, PowerPoint 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Visio 2010 SP2, Word 2010 SP2, Excel 2013 SP1, PowerPoint 2013 SP1, Visio 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, PowerPoint 2013 RT SP1, Visio 2013 RT SP1, Word 2013 RT SP1, and Internet Explorer 7 through 11 allow remote attackers to gain privileges and obtain sensitive information via a crafted command-line parameter to an Office application or Notepad, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "Unsafe Command Line Parameter Passing Vulnerability."CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
Microsoft Office 2007 SP3, Excel 2007 SP3, PowerPoint 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Visio 2010 SP2, Word 2010 SP2, Office 2013 SP1, Excel 2013 SP1, PowerPoint 2013 SP1, Visio 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Office 2016, Excel 2016, PowerPoint 2016, Visio 2016, Word 2016, and Visual Basic 6.0 Runtime allow remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka "Microsoft Office ASLR Bypass."CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Windows GDI+ Information Disclosure Vulnerability." This vulnerability is different from those described in CVE-2017-0060 and CVE-2017-0062.CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
A security feature bypass vulnerability exists in Microsoft Outlook when Office fails to enforce security settings configured on a system, aka 'Microsoft Outlook Security Feature Bypass Vulnerability'.NVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
The Windows Graphics Device Interface (GDI) in Microsoft Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, 1607, 1703, and Server 2016; Office 2007 SP3; Office 2010 SP2; Word Viewer; Office for Mac 2011 and 2016; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Add-in and Console allows an authenticated attacker to retrieve information from a targeted system via a specially crafted application, aka "Windows GDI+ Information Disclosure Vulnerability."CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions: (show all)
Microsoft Office 2010 SP2, Microsoft Office 2013 SP1 and RT SP1, Microsoft Office 2016, and Microsoft Office 2016 Click-to-Run (C2R) allow an information disclosure vulnerability, due to how Office initializes the affected variable, aka "Microsoft Office Information Disclosure Vulnerability".CWE-665 Improper Initialization
Vulnerable Software & Versions: (show all)
Microsoft Office 2010 SP2, 2013 SP1, and 2016, Microsoft Office 2016 Click-to-Run Microsoft Office 2016 for Mac, Microsoft Office Web Apps 2010 SP2, Microsoft Office Web Apps 2013 SP1, Microsoft SharePoint Enterprise Server 2013 SP1, Microsoft SharePoint Enterprise Server 2016, Microsoft SharePoint Server 2010 SP2, Microsoft Word 2010 SP2, Word 2013 SP1 and Microsoft Word 2016 allow an information disclosure vulnerability due to how variables are initialized, aka "Microsoft Office Information Disclosure Vulnerability".CWE-125 Out-of-bounds Read, CWE-908 Use of Uninitialized Resource
Vulnerable Software & Versions: (show all)
Microsoft Word Security Feature Bypass VulnerabilityNVD-CWE-noinfo
Vulnerable Software & Versions: (show all)
File Path: C:\Windows\System32\Microsoft.Uev.Office2013CustomActions.dll
MD5: ae941fd23d9f03a60e1f088275b3937f
SHA1: f1270093dd18069b9c9ba836d5d389a7b1e58a41
SHA256:e101b8f06ebb203bc4fe5236c0a0db7b6adcb9d37e8bc8dea95d746b9fa71ebd
Microsoft Office 2013 SP1 and 2013 RT SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Uninitialized Memory Use Vulnerability."CWE-19 Data Processing Errors
Vulnerable Software & Versions: (show all)
File Path: C:\Windows\System32\Microsoft.Uev.PrinterCustomActions.dll
MD5: e2ca0e41500dac9ead9c6b78b623eb3b
SHA1: f67505f0e2f331e2ed1e779b312fef11d9eb816c
SHA256:152bafa7d30289a165781e106f9bc7473ce0155889a1e4943887e4513e3691c2
File Path: C:\Windows\System32\Microsoft.Uev.SmbSyncProvider.dll
MD5: 83edb35549539413ff1a100ff93119a5
SHA1: 1427bc2bdb9ba91e2360e864ecf809b85dc19308
SHA256:3aed5bc8c5fb066ef4012381561bad648ff75e4098507a17e96109e482e88228
File Path: C:\Windows\System32\Microsoft.Uev.SyncCommon.dll
MD5: 2d76a5b22e9a23cd978f9e983e5b445e
SHA1: 67d13b4441118c841b7fc663d2eb1daa84fa87a2
SHA256:1fc1c966618f3de21f51f5e4bc5c658cec61532af64379e6701fb5d73899e137
File Path: C:\Windows\System32\Microsoft.Uev.SyncConditions.dll
MD5: 98d13510a46e54accef0675de6f86fbd
SHA1: e8de60514408417091b572de87bae6a19ee1747f
SHA256:0c07a1aac1a05547ec9e6038521829e702e675d31f7abe13f5c016c6f3d501ac
File Path: C:\Windows\System32\Microsoft.Uev.SyncController.exe
MD5: b9d4c0ea77e598b45015e36624d8fbe4
SHA1: fb69e81b5d252152630d3f1b6426fef4de3fc2ee
SHA256:d0b753fc637891aae7fb08ad4b4efdc693689ee8e6a9b7145e15e495493972f3
Description:
AppBackgroundTaskCmdlets AppBackgroundTaskCmdlets
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppBackgroundTask\Microsoft.Windows.AppBackgroundTask.Commands.dll
MD5: c1b1a3859afa48daa8aece53f2be4aa7
SHA1: cc76e13900bd7b9f5905cc2b32220a9b76426013
SHA256:274ab9d5c70440808954b71f5ae6f8d7d32e89bd0fd397c6946b03a1cbfa822b
Description:
Delivery Optimization Admin commands PowerShell cmdlets for Admins to monitor Delivery Optimization activity
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\DeliveryOptimization\Microsoft.Windows.DeliveryOptimization.AdminCommands.dll
MD5: 6588140a7f6180eea96e17e2aa066314
SHA1: c782c0e981995a1fcbaa85b59ee0c7ac4c0a5b41
SHA256:462514e1cd6734dfeb28ffdbd9a5f437b314492506c68e82df17cf11c5d27dcc
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\NetSecurity\en\Microsoft.Windows.Firewall.Commands.Resources.dll
MD5: 477da7eb99f68aaf3ec7a3ab0a014887
SHA1: b101258660d6b579bc702ec39875e3b59f753399
SHA256:d37a2e60534cb02908f2354e2f7acac04386d8637d849d071c0cf338f802527c
Description:
NetworkSecurityCmdlets NetworkSecurityCmdlets
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\NetSecurity\Microsoft.Windows.Firewall.Commands.dll
MD5: 38311a01599aa49eb11db4971c7ab80e
SHA1: 2f654ad2d85a19cb8a693bbd79476ce69cde947d
SHA256:7b28bb79b3d8b6b2643534af2f79c7b3cd318187838b08b82238b7abcfab2a97
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Whea\Microsoft.Windows.Whea.WheaMemoryPolicy.dll
MD5: 0f9cb67dbdfaadb956cc81b47fc8aa08
SHA1: 2251bb36d1376b728a2018e557545cb4944b3191
SHA256:a1e4a1170d7a58be8b4b58b989dd0ebe499f03127f977af9d994ce42b8297097
Description:
WerCmdlets
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll
MD5: c6a6a2e6a7d41a903f565bbd08a0ffed
SHA1: dac3e6df311333cddd81c6285b6ed4b024fdcf6e
SHA256:e75f6efa0094332812bc74691d6cd57615d0e14f85a726e8c432f096cbad16b1
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.CWE-354 Improper Validation of Integrity Check Value
Vulnerable Software & Versions: (show all)
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\WindowsSearch\en\Microsoft.WindowsSearch.Commands.Resources.dll
MD5: 172f9842a6fc622b9c610b98437ab5ae
SHA1: 0c1e4bdf536ff932a21815cd658d81c44e4e540b
SHA256:2e943bf695f885aa2cf0730d80e381b9fa5e585c1f48614f2d5bc8eae3e2294d
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\WindowsSearch\Microsoft.WindowsSearch.Commands.dll
MD5: 2e522a784b368cb5cc0778f3a1747027
SHA1: 19c589d8dc03cc2530abd40d8d5a27ee082d3294
SHA256:47b216bc34f96363f07948b77560923e2807992c123148b47e43f8f7ee86f80c
File Path: C:\Windows\System32\MicrosoftAccount.TokenProvider.Core.dll
MD5: 9398048a2c9e13352b851ce3f4cad31e
SHA1: 4e7cb8c6f82cf19e77991aad773cac343992368e
SHA256:76a63ce410c4afec9cac42d6d514549de3e485190c9e2fb477ad409b455fca1b
File Path: C:\Windows\System32\MicrosoftAccountCloudAP.dll
MD5: 55b298d858ecc4a07404c31552d1173d
SHA1: 33909734205301462992b5ed66b9088235cf7c6f
SHA256:ecadf5d212c24cf2873f1d1bf461869684df04bb615b9761af5eb2a0c3d36ca7
File Path: C:\Windows\System32\MicrosoftAccountExtension.dll
MD5: 40840f18a78190ad95a7e904ab93a888
SHA1: c4e290878e45f57d443437e2a9efa3119a35442c
SHA256:d7139b0fb11b9730c4d39864ccb0dec563bd14586240c8a565bf50e70f30a2b3
File Path: C:\Windows\System32\MicrosoftAccountTokenProvider.dll
MD5: 3ae566497e7cd700aa1d2c7b5d763fd0
SHA1: 02e8e6bacdf783a4b06b49562bd5cc8eb7afa02f
SHA256:6908dee1f1e7410e93b716567314c2456ecb2c5267d0c12b34ec4223f769a577
File Path: C:\Windows\System32\MicrosoftAccountWAMExtension.dll
MD5: 06b6ca48cf2a6ae4083d2190efb55fd4
SHA1: d5770fd73ff06ca3c85c2237d49e2bfb1cdd462a
SHA256:63dcc242b75cce04a6d9b620f64c09a623129d595fdc3bea7e8925bd5d2b2000
File Path: C:\Windows\System32\MicrosoftEdgeBCHost.exe
MD5: bdeba6b8d7fed969e43c5ef6be69264a
SHA1: 00ed479facff170a2ad4ffafb3d8f640476f1bb6
SHA256:a337c38ff0da911ea8c6552bde151de85108c6d3a7ceff15014b35c0586b392d
File Path: C:\Windows\System32\MicrosoftEdgeSH.exe
MD5: 865888fd7be13ada39e2e3947efbc50b
SHA1: 85aab9f6d8a1f009ed8e87ca4663e03c2eb9f191
SHA256:643871f1c4dde924dc04b673615e4e83f302b17032351ad9d831d39a3bffffbd
File Path: C:\Windows\System32\Com\MigRegDB.exe
MD5: 86b96422a58603b6419c1b8173241fed
SHA1: 591cfea356d96ccbd7cc94eefa21d0b2b18b8193
SHA256:75f6fa1d2bd6cf3d2e3b1389b55ec533efcf1ad9c3ad5c71799621a6e2a7c0c8
File Path: C:\Windows\System32\MinstoreEvents.dll
MD5: fc9e7eadfd4df71f04438cd219f5a454
SHA1: 7b12dcd25afd25904f0ec881a7dc338079567ff9
SHA256:9293ce28fe550f66f9633a34623027b006b09caf5094eeb59ef64c62f414b3ce
File Path: C:\Windows\System32\DriverStore\FileRepository\miradisp.inf_amd64_28e9528d0da99fd3\MiraDisp.dll
MD5: 56623a6985af3317276cfc69db07817c
SHA1: c63a3f25726d9e1606c74fbdaf23ca075b01ae4d
SHA256:cda519ce478ab8e9cd0369a89b8009d7be72f2177d5c2540f43ed924b306eb03
File Path: C:\Windows\System32\MiracastInputMgr.dll
MD5: f34eb3813bc825f23a4445b6e1bf7964
SHA1: 50a1d8d58854abac04ec1922a9af5c9c56b259c1
SHA256:e557232c7c10b09e32d1bb8b42bf6694f59782963629d3304c6a56756fe9a836
File Path: C:\Windows\System32\MiracastReceiver.dll
MD5: 107d8c36ef24eff1a96ba1af5555ffe4
SHA1: def0d2b3533dff4b9907623731189465baa36284
SHA256:18d04f4c9662b507d4ae338fa7b786a73e2c2733e3bb9acf58817290a70c3e9a
File Path: C:\Windows\System32\MiracastReceiverExt.dll
MD5: 849c356546330664875bc963bc700a04
SHA1: 9b7dadae537c1707904ec344b1d5abf2ebac60d0
SHA256:a9825728558e33a235bc27414cf59d695e7d853887d619682b16b4f5acb9d1a2
File Path: C:\Windows\System32\MirrorDrvCompat.dll
MD5: 32fd59074b749d8f4e8b257ca26a52c1
SHA1: 914bd65a3664e6ac49deab76eb54ba3b869a71f5
SHA256:cd4e2a7f3e4d034bf8b708b3c196deaf2accdc2e4681dc001ac8c9cc1da9ade5
File Path: C:\Windows\System32\MitigationClient.dll
MD5: d87818c39410a5fd7100ee1d1ef568b4
SHA1: 5d2575d53a08579532842154e850abfc2510e4f9
SHA256:d858e3e164e8ce74b37a63e7e748e7e1e3e184e0cfc3689168bc41687797c8dc
File Path: C:\Windows\System32\MitigationConfiguration.dll
MD5: b1551a772afae7ff6c1702084979a00c
SHA1: be6827c50792bd68812e22e7944ef3516e65d488
SHA256:a44cd3b7d2ca1b78afc21e68244537cab39bcddd94bb384f12b8a855a9944037
File Path: C:\Windows\System32\MixedReality.Broker.dll
MD5: 6fb0fa726b2bd8745c2d4c3290d8ee96
SHA1: 91b4fe1fb76af12e095b7bcdfaadab95f9ce170b
SHA256:c26f3a5d579e17b19356adcb21cb7c81d4488d291e6e2d3cdf5ad64b63d89c25
File Path: C:\Windows\System32\MixedRealityCapture.Pipeline.dll
MD5: 3b7d7ce1a3b13a55fac8ad5ea69ccbea
SHA1: 75bc53d81690aa799b9a18568cabf4d67384016e
SHA256:0a239ebfdec634e62e69900a79c7edc00011ad6806fa944c7ceccbe651dc777f
File Path: C:\Windows\System32\MixedRealityRuntime.dll
MD5: 77f4b4c1af8d1b0babb13165369ad234
SHA1: f35d6498cd2c27f6271f06c59b2011d272fdfb4f
SHA256:e3e944af29640913c0f1909320a018d5a468c51392b2fadc8234e7ffd38410e7
File Path: C:\Windows\System32\InputMethod\SHARED\MoIME_ps.dll
MD5: 2069c339e540cc2efa96ea81b2966286
SHA1: 2a0c8fe9b88518606b4c62a432559fbcec460fc3
SHA256:b65e0f58194b18793066615206c83715c64f6fa4b8fb72f2e46daef0f93b1196
File Path: C:\Windows\System32\MoUsoCoreWorker.exe
MD5: 12cfa013ab4e19f413b2a001dddb586c
SHA1: 5fdf810cf53fbfe18724cfa469d0e641e0acdf70
SHA256:ffc7037fb0cd77bfbdaca75c10714eceff6956a79fd1de543b81093d4b238365
Description:
ModelsControllerLib
File Path: C:\Windows\System32\cAVS\Intel(R) Audio Service\ModelsControllerLib.dll
MD5: 14a671f98a289ff2c0fc72b4ad2b80df
SHA1: a92dc88d213ebbda891db7763249152261c64646
SHA256:6c3d35702b90dac46b20f06bb6d418de41d3d7cb43554834e4d108b7aef7e333
File Path: C:\Windows\System32\MosHostClient.dll
MD5: 51c73620673cb0a70bcbddfb800e9161
SHA1: 5ab1cfdfc32e267d5e7a7c83ca2eff324efa4a55
SHA256:e56193c93cd47117e439ca5037d9d51416a8ff9811dbe1f84a480bbaf844d900
File Path: C:\Windows\System32\MosStorage.dll
MD5: adc3fea1333592e7b127b057db27d2ea
SHA1: 7a2721c96006d05f9a97f24a229d5325d1c49f75
SHA256:919903ddd12e4747c178286a91c76df4ac455d45aaa72cd0d3946a2e2b669ce5
File Path: C:\Windows\System32\MpSigStub.exe
MD5: 71cf589293424c4389202c7f1752fb2d
SHA1: 6103d9f6bf95c772c8b7ee89aee370cdca4642f8
SHA256:071b0d3a08503a8b88aeeda1d20f371a563377028f6e252dc66cce60ab8f823e
File Path: C:\Windows\System32\MrmCoreR.dll
MD5: 1a5de7b3b146000b19789394a869b73f
SHA1: c03132f26aa12482bbf53c7fff756200e9312cbe
SHA256:d2c7c060e3633f162c3c17fe4eb61646b9ff036f8858807122b151f99ce9b4fa
File Path: C:\Windows\System32\MrmDeploy.dll
MD5: 12145bfe8953524edfd1fcb859ad8fc8
SHA1: 8a87a684645aec0b0b7194bea7d4c49e317de8d2
SHA256:dd4528acefc46775ca10378f740779ec1c95f481449234cc7d4ed492979bc9e7
File Path: C:\Windows\System32\MrmIndexer.dll
MD5: 459137836bb80448885b874284e0ce38
SHA1: c9e903f37d8d300c81cad4dd455e7101799ab0a1
SHA256:cc5994ada61d025bd4ea0953219085560620f9a2f8c735c5e0062a0a7d1d64bc
File Path: C:\Windows\System32\DriverStore\FileRepository\wdmaudio.inf_amd64_d2772df433988671\MsApoFxProxy.dll
MD5: 912391b570c17a5803d0731c0c3ebbdf
SHA1: c1cc001e8cabba6f843e6be35b8ef888db5300e5
SHA256:ef26e63c27fc434c5a0c3458a457843ae73721447551295333447cb3d8015d5b
File Path: C:\Windows\System32\MsCtfMonitor.dll
MD5: 25fa8e3b79df11f8d0168b78cbc4a69b
SHA1: b2f56233f66591ee3c1b28d67b756fd706d00bf0
SHA256:3bef11434d5099bd7879de930b73f4d2c3679aa31b12710827fb957757a40ddd
File Path: C:\Windows\System32\MsRdpWebAccess.dll
MD5: 6c0d3d06b6c912d442df432f253abf6d
SHA1: b50fe15dd901822596a4e4068b2e86313611362a
SHA256:c970b263a15e55810f0bd4bbbd601fe93f43daee90127d10e2c4b12d5ce75c02
File Path: C:\Windows\System32\MsSpellCheckingFacility.dll
MD5: 34b6216e43b2db852a09ad1fa0e7e865
SHA1: 642607e82fa266526efaada362bacd6b8371b244
SHA256:f9001c1edc7d02093f81dab156974d50bf7b0af6caee38948b6a337e55403708
File Path: C:\Windows\System32\MsSpellCheckingHost.exe
MD5: 69aebd073358768e9df3a2176f3677b7
SHA1: ca088110829adde6248c1d6c8b5ed4dca656efeb
SHA256:bbf5dea1144b914578ef93f1e7a6097a1d5590dc7b7687aadcdc97d8f6440221
File Path: C:\Windows\System32\MsftOemDllIgneous.dll
MD5: d5054c99c67bfbd824b5d5bf7a25bd64
SHA1: 4f858d3ac4b8b4a760ae5553e2b3f360e5e5d9ad
SHA256:ae6e899f87e5af42230910eb36b410eb41a8aa7b8742d02538efbe886e917c43
File Path: C:\Windows\System32\MshtmlDac.dll
MD5: b7b8deaf6086b49798d21432ec95ea7e
SHA1: 15e437b29ff7f93d8f9654ad100551f7edfe2068
SHA256:0a781463f6607e6679dba87bffd087c8aa8d5909d70a05dc8f983e548e89847c
File Path: C:\Windows\System32\MsiCofire.dll
MD5: 9e38d02a0e135e97235752b4d87670ea
SHA1: ee802167bc17f5806f01d267000f9382bea2a96e
SHA256:bd8ba260679cfc37a21e5c277645d7dec875785de2f10fc9c801923061be6fba
File Path: C:\Windows\System32\Dism\MsiProvider.dll
MD5: 0655a77306506895e5d3b5e7dbc833e0
SHA1: 51087449d02fb42c948a1f53735bed1ccedd1ad8
SHA256:bfac469b3bfe0dc5419059d889eabb2ab1bdf1a6298a6de743cf0f189a48c679
File Path: C:\Windows\System32\MtcModel.dll
MD5: 50488bc59280f40b9eb733f32e82a402
SHA1: 9c0330ace0d1bed8984c572a1ceffd170111a628
SHA256:9013e3bd8e3172bc513b88ad141f065a133b7307d303c62569383e5fb3c422f7
File Path: C:\Windows\System32\MtfDecoder.dll
MD5: aa86a61e19c382eb3d3b7f59a233ece3
SHA1: e75c059a99e4a6b810f03fa639cf40c54cdc0c02
SHA256:13664ebefc6eec428b9a8cf1d8e2533f734927e11a836c23ba6e7cca2efbed29
File Path: C:\Windows\System32\MuiUnattend.exe
MD5: 8621372039611b5bcf6afd3c38cb257c
SHA1: e0dbba0443e627cda60cc9665055ce3826867975
SHA256:82cb496ab8927f9ce1e8869048f3f0e4744ff5b0092d1e5ba223bc92591a2686
File Path: C:\Windows\System32\Intel\Service\MultiChannelWoV.dll
MD5: 8e160b1c225bb050d31f23a9a993421d
SHA1: 10b03f4aae1720829719387a5ae2b575c3617a9f
SHA256:53971e1ec8a8a3bb6e5a27682c0ecc7142746f4bcec6c5636538ceb4a379c5fa
File Path: C:\Windows\System32\MultiDigiMon.exe
MD5: df6aa1b1c7732809e42ec4b28738b813
SHA1: 498766636ceab6c91326d2fb666f40fdb4a7d335
SHA256:ac37148d091bc02d24e40a1215aeb9a750ec10c48f7d709e4e1483e665677ab5
File Path: C:\Windows\System32\Intel\Service\MultichannelWoVCfg.dll
MD5: 0132653100bfe94d9f899ac10d581b3d
SHA1: e82d820a5edaffeeead317ec9b09a6433dbbf758
SHA256:47ac92fcbc93f867d2f3190e3096cdc8875bc52617e7e8c0b835be2aeed7a0bf
File Path: C:\Windows\System32\migration\MupMigPlugin.dll
MD5: a68178840f0c31de2b4f631ceb3eda12
SHA1: d952992e80018270e8d0a1f9513350a9968159ee
SHA256:029ea50f7f9072f5d1d51a4576ce77a6a894546eb719b11c73cddf79be952c31
File Path: C:\Windows\System32\migwiz\replacementmanifests\Microsoft-Windows-Mup\MupMigPlugin.dll
MD5: 1661c8cdf7e624043a33fef00817fad7
SHA1: 62b2a6038b49baafd9550cb80ba69479a758afe1
SHA256:a5ebc3cc39e06d9e91619b87f45a3bc3702e705d4e11d390b671910f39dfb0a0
File Path: C:\Windows\System32\MusNotification.exe
MD5: 81adf54b535e60e0f7a4a84251bca16b
SHA1: 26cb35a2f5cee9f041c5f685100ebc9e7f87fb96
SHA256:0b9f77de213ad6a180358f458d614e777b74a5c3e01fe7e7f7286b0cde72cbae
File Path: C:\Windows\System32\MusNotificationUx.exe
MD5: b383b32b71a4d0f974290304a0b462b7
SHA1: 7364e8bf4ebd117857d952610070234ad642814d
SHA256:2132441988e7d07c1c8f9a15ec1eaa6930e9c858db9f4c7c669bd6be3e83d578
File Path: C:\Windows\System32\MusNotifyIcon.exe
MD5: 289b0e86d2bd1f38cd3d532269d1def3
SHA1: fe8476247389d2c48f72efb817bbd91de8fb3ede
SHA256:d1c0123b1f6a76e3db9961047a5a376268837705456c1e9b545eec1aab095fa7
File Path: C:\Windows\System32\MusUpdateHandlers.dll
MD5: 396fa2b49de7c681ad2861dda4be55f7
SHA1: ee12784ae15bc30814091463079fd6bd2805c9f1
SHA256:a1b11a5e6323d6e58cd13a814af219fae07699c590ceaa7d2cd2de3a1e14dbb0
Description:
NAP Cryptographic API helper
File Path: C:\Windows\System32\NAPCRYPT.DLL
MD5: eb8511c5c7a5fc451f362144133e86c6
SHA1: 519156bb97d57eede08ec311239fb728f880d5b8
SHA256:072bbb111412321fa0259bb717c8bef32dd3fd33b2e442bdcef3035dbf24f012
Buffer overflow in Winhlp32.exe allows remote attackers to execute arbitrary code via an HTML document that calls the HTML Help ActiveX control (HHCtrl.ocx) with a long pathname in the Item parameter.NVD-CWE-Other
Vulnerable Software & Versions:
File Path: C:\Windows\System32\wbem\NCProv.dll
MD5: 93b04effb869433d453fcf2b83e5590f
SHA1: 3ab6dd4eef5288031a551e31fcc32bde0519cebb
SHA256:807296c34bd97d3ce02630f6ce06090d0749e9fec0d14daf8f48aac4316d2a9f
File Path: C:\Windows\System32\NDKPing.exe
MD5: 5fc26e00b9012cc0188f65bb999174e9
SHA1: 84b873da341d53fba671c10869f02ac8b8507e13
SHA256:e2e6ea04db42f5abd29c767681798b070a25b0768106689e36613b2e3a810170
File Path: C:\Windows\System32\NETSTAT.EXE
MD5: 7fddd6681ea81ce26e64452336f479e6
SHA1: c038069021cea437ae40b421929e9d4d1a3440b3
SHA256:b094e827af70241d71bed9767ec1a254fdc4164a646b2ba4c7105cd783adba0d
File Path: C:\Windows\System32\NFCProvisioningPlugin.dll
MD5: dc4eec56c04c42afd3c9c1d9099731c5
SHA1: 090a6a7bda739ea8ffc483e7eff9ceaaf67865eb
SHA256:88e26498bd1980ccd03796922ffed4c2863f4eed629418db589e4b03c92e88eb
Description:
NLog for .NET Framework 4.5
NLog is a logging platform for .NET with rich log routing and management capabilities.
NLog supports traditional logging, structured logging and the combination of both.
Supported platforms:
- .NET Framework 3.5, 4, 4.5, 4.6, 4.7 & 4.8
- .NET Standard 1.3+ and 2.0+;
- .NET Framework 4 client profile
- Xamarin Android, Xamarin iOs
- UWP
- Windows Phone 8
- Silverlight 4 and 5
- Mono 4
For ASP.NET Core, check: https://www.nuget.org/packages/NLog.Web.AspNetCore
File Path: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_12bdb8127c4c0458\NLog.dll
MD5: 4c13805fdab3903e4cf135301bec9098
SHA1: a65d312f07c596861dca3d6e80ff7c55806b1eb1
SHA256:690b02ee7d53b41e3e032cca799f6c65a9bdb458ea76691e4f757c0720be2526
Description:
NLog for .NET Framework 4.5
NLog is a logging platform for .NET with rich log routing and management capabilities.
NLog supports traditional logging, structured logging and the combination of both.
Supported platforms:
- .NET 5
- .NET Core 1, 2 and 3
- .NET Standard 1.3+ and 2.0+;
- .NET Framework 3.5, 4, 4.5, 4.6, 4.7 & 4.8
- .NET Framework 4 client profile
- Xamarin Android, Xamarin iOs
- UWP
- Windows Phone 8
- Silverlight 4 and 5
- Mono 4
For ASP.NET Core, check: https://www.nuget.org/packages/NLog.Web.AspNetCore
File Path: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_9cf4db1a1fd1b22d\NLog.dll
MD5: 563e2f1c3a8a6a902ad26fdf0925693e
SHA1: d7f0eaeff5cbe33962005954c838bca6c0d5fab7
SHA256:04a3ff508d924ae0bb6fe8c3b1ce6bd9fe3956843b7881b8436647657b0bd039
Description:
NLog for .NET Framework 4.5
NLog is a logging platform for .NET with rich log routing and management capabilities.
NLog supports traditional logging, structured logging and the combination of both.
Supported platforms:
- .NET Framework 3.5, 4, 4.5, 4.6, 4.7 & 4.8
- .NET Standard 1.3+ and 2.0+;
- .NET Framework 4 client profile
- Xamarin Android, Xamarin iOs
- UWP
- Windows Phone 8
- Silverlight 4 and 5
- Mono 4
For ASP.NET Core, check: https://www.nuget.org/packages/NLog.Web.AspNetCore
File Path: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_a9a2dde7124f013f\NLog.dll
MD5: 6501b55622160275a1bfd9fec26927fd
SHA1: 56888ae623b9936eb5a61708fd08d302ddf0be4d
SHA256:7646c3040f737e6230b86c0978d67867b7dae79d533bf66e33c74cb2eb20aa26
File Path: C:\Windows\System32\NPSM.dll
MD5: 75966a6ae147246d9e5263f5742be877
SHA1: 76691f055fc01b6b03a1308f19bc69d167380e72
SHA256:c20f90a7d78d2d7c47f656569e925160d739b291d9173867bb35a799ed642f43
File Path: C:\Windows\System32\NPSMDesktopProvider.dll
MD5: 9df38787668702a09361bab3987946bf
SHA1: 143c462d26106fb02c6ae84ff38cd6b7ca3ad991
SHA256:a12ebe329e2adb54206d66dd72246c905c61790e0992b32324146cba2be7ea9c
File Path: C:\Windows\System32\WinBioPlugIns\NUIVoiceWBSAdapters.dll
MD5: c9316e7015605e0bc96f7f02de8f0c24
SHA1: 2b655c2874afe0c0741ba525344574ef5c0ea059
SHA256:aebe208c955f2476f04496c9f7179b6e5b9112234b8467375702aacbebb81d4b
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\Display.NvContainer\NVDisplay.Container.exe
MD5: b689f517235b0f39ddb735f5ae03fecd
SHA1: a8cc85b813de0a3fb4c4c37f68e1a78f70888d1a
SHA256:ef5d521ec9d01ffe757af3cf1c004df40be0ad337fa763491f261fd9b646d9a4
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NVGPUP.Container.exe
MD5: 0bfde01c7fd26e9cf3cf832a0ef2f37e
SHA1: 55dae25a2a4eea04733599b21c4e1b6b8b66041e
SHA256:63f3a0b475aa39cf7b9f9d78241d0be9480e2d35aa524b972830d26892135b95
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NVI2.dll
MD5: 6ad0a795ec5c5a405a8b0920dbf54292
SHA1: 64099a6d1c6b2c6b30b02b2001b27dc8e5f17892
SHA256:635d25b328fb13211aeb63a9326b39c17005840c51122f62e6fa2b00948afe0b
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NVI2UI.dll
MD5: 1f7a8672656e9ac0d0601a4548b858e1
SHA1: 6c25d5bd4c1351a10a88566c6c3dbea10d759a64
SHA256:3b907d0ae5ba8efd4a760145d8858230d085a4e26cfed3baa557a6f49172f587
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NVPrxy32.dll
MD5: 8d537cfae239e25c5161816b3f8e9e78
SHA1: a8b1640ac7a9dc6cc71c0cb5136d7082b78ecb69
SHA256:738b6d6e3e8a1ee2661db0366929b9bbf53f4eb1ab3d3a68008d6fa02c92840b
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NVPrxy64.dll
MD5: 778963cdaf3d3857855b87df3a8d4aa7
SHA1: c760bcfb0d104b37b665425599b4aad719225e4f
SHA256:5d0d7b546d58a500fc034296ac1bcc7a0cb78bb468acc28c363a3dd46d180dfa
File Path: C:\Windows\System32\NapiNSP.dll
MD5: 6351068e89a44c5055c82bf262c62f09
SHA1: bd1c0935fc1a6c6c8bf7fae4ab911e9facf0ec3f
SHA256:38859c2e5e50f73db61b4bf17152d01e4b1e9b989e494d1a8a1b162520758ef1
File Path: C:\Windows\System32\Narrator.exe
MD5: 2c5c9ef0e6d1742fa9f62483bb892fcc
SHA1: 74e5d0dce6d6a7132e324b4e349e333ebb78bb47
SHA256:179152b08da9fa7c18fed4e70025b1d189e00e9ac8ab51f3f9db3f2c987127bd
File Path: C:\Windows\System32\cAVS\Intel(R) Audio Service\NativeApiAdapter.dll
MD5: 042a818b27c5f3be0126337844edbb2a
SHA1: 8a83fcd6d7e900fbac8a47d9e33da18c163d81fb
SHA256:92d90b67f32bcdba7b302ba3c6f3f26a50b1ba7c4a09f781d2ac8f77ee58a455
File Path: C:\Windows\System32\NaturalAuth.dll
MD5: d8317d771ad17c855938e86835a0e254
SHA1: 88e755c485cb624c1db89607e5f25d6e6151f111
SHA256:b459f205f1af631e54216deaf2fdd0511871b8f46e4576f31c62ded110c9c534
File Path: C:\Windows\System32\NaturalAuthClient.dll
MD5: 975d322f19a2a8cab86238c710a15916
SHA1: fb030fed390c578c997a013b81e89a2e6eabc9f7
SHA256:b621f0dd06013e55a308f75271e73a287676da8e6c10ed5e534e19815a256319
File Path: C:\Windows\System32\NaturalLanguage6.dll
MD5: 43d581dca4e1bf863361d7f5d0a65aa3
SHA1: 938990cd442392379f5e78f9af8409a5860bd6d1
SHA256:ccdfaf14aca819078ee14b8b4130252e2c7d2e5b21624bf9dedda0a88e15eb46
File Path: C:\Windows\System32\NcaApi.dll
MD5: 364263384c326187a30b5bc01185feaf
SHA1: dcd9cfef354a584f61ea8f90dff666dd80b3423e
SHA256:bdd46a136cf6a8e090836a3ec445062d0b5e25496f2e92b576c92b0b13cf3827
File Path: C:\Windows\System32\NcaSvc.dll
MD5: d47a20839608b8213065d7afc8c42195
SHA1: 95884e843c5112b14eb135e6211b95562ac1bdcd
SHA256:7b0187be9705ed2f925616c13b3744bac0a9c96b21be503d96bc9ee7ee125b33
File Path: C:\Windows\System32\NcdAutoSetup.dll
MD5: 13c84fd512385cfae09a8e0d26317f47
SHA1: 61c7e65540f210c38c7f4b5b7413a02fe843a51c
SHA256:004cd9f9bd6b7ea50a2f7a86453f947cfc7a88f402c5425f8a48d71af8ceb5ce
File Path: C:\Windows\System32\NcdProp.dll
MD5: b3a8210162ab1351c5a9c24590ae601d
SHA1: 4e3f968d0bd4388cbabe662320c81d65a16ee9d1
SHA256:099b062584dd5c2fcf9fad90ee1d952378f0c58a9e3eae993dea87290549f7d3
File Path: C:\Windows\System32\wbem\NetAdapterCim.dll
MD5: e898de356f8c0f013c8b1ed984100ff0
SHA1: aa694e107a87deb0659a4c68fc3030558f341b98
SHA256:99556fdd0a99f945100e52ee5ffc9d9c168ec9f97761a1a180e553b12042dd36
File Path: C:\Windows\System32\NetCellcoreCellManagerProviderResources.dll
MD5: 019c6f6c0432202977300ad4603cd070
SHA1: a580c39f496230c47c9ad393802b0a0ed9acdb14
SHA256:5688e147d8c5e570deed96a8971dfe7dab6c93b3b3ffc240507dbdb129725bb3
File Path: C:\Windows\System32\NetCfgNotifyObjectHost.exe
MD5: 273753ee70980bf17791a61ab0bbf411
SHA1: 4eafc9227ba8832094fa9b175052f2edb29519f8
SHA256:2870b40298c879eb204c7960c6b6bf40b50c3cdfb62ed9a442b147637ea0a969
File Path: C:\Windows\System32\NetDriverInstall.dll
MD5: b6cf1040a13dfa71d7c7dea0ace60c03
SHA1: 0085c8591bc0796d50f1ee79e6ceb55df2ddfd2a
SHA256:54fe85b06aeb47588367e6bc385bd8241bfde3e0e7e79a98386746a2379cf64e
File Path: C:\Windows\System32\wbem\NetEventPacketCapture.dll
MD5: 27914d37b5c7a2a702c415eed311bece
SHA1: c909acec36bbe541813f053206f6a479c20da103
SHA256:3b28fde01bd27585c1d19afc4bc833bef913123326f3df08691f2409b492a3e3
File Path: C:\Windows\System32\NetEvtFwdr.exe
MD5: bc8affbbbb2b7235b206e948373b7d80
SHA1: 72b2db0543d7cc10b38c45286aa8d143c32e216d
SHA256:d0a85d5d71c08149325e4a2d34c5c42de5505b2790a96880bf839b39f3cac717
File Path: C:\Windows\System32\NetHost.exe
MD5: 0c8bec1c52ffa65cb36d21404e8f54de
SHA1: 2d97f07676f85c6d1a24b84164268c9ae9eb3db9
SHA256:ba3426f2b9c5b657f38721bdf7ac3229804597544ff5f4096d9f858ad00c8a3d
File Path: C:\Windows\System32\NetMgmtIF.dll
MD5: 89e11b57084d7111fd93b4a86726c712
SHA1: 0233978f5771953212b6bdfd27d6e1df204891e7
SHA256:5365ebd8a43661ce4a28f711229ac52ac722615931a0a4dd38d5ab0b0fe477f7
File Path: C:\Windows\System32\wbem\NetNat.dll
MD5: e4478669de0bf9e46590a551913196b3
SHA1: 808204809d97e3fbb3570d5b72ccc2c955a0b776
SHA256:f069c670f676838d728a57eb2376de40c1f224b83a120a93283c45d4a05d8e2d
File Path: C:\Windows\System32\wbem\NetPeerDistCim.dll
MD5: fb68512517f5b6eabd4e7b33788cc0d9
SHA1: f7767cead8d575214f84701e4584bd09d54469e6
SHA256:aaef07fd447dcb34f9df99f69dd7decfd09f9b985ccc42209b666b30c370d58b
File Path: C:\Windows\System32\NetSetupApi.dll
MD5: 015bfd880f899c10bf650b92c00b1086
SHA1: e700c6f15f8f03a99ac8ec4586c51614e7406043
SHA256:48c0700c398ce108e4fcfa53f7d4e437f68799331b2096af2e5c870ebf562507
File Path: C:\Windows\System32\NetSetupEngine.dll
MD5: 6183789a7ee627dd4309278dcdce6a50
SHA1: 25697f008f04a99e2bc796694bc5172115e602c0
SHA256:1659e7bc7fe998ca70a7d6bb66eeb7cc26d5a4e2c3ac5949c5bf370474700da4
File Path: C:\Windows\System32\NetSetupShim.dll
MD5: f806ea6b86cfb730f2003dff902c9751
SHA1: f4a1efea26515bbf0b36a3fe46c7d74095caa548
SHA256:c7abed4982d698df9ec0be20ff8cdde9182fc9454d6f53a788236601413bc7f0
File Path: C:\Windows\System32\NetSetupSvc.dll
MD5: 5d0c147354c0e2c5d5a2daa1c254dc4d
SHA1: a731ff8803a54affd4579d7394ef4c70d839db85
SHA256:d074d50c6d20cc7827daf23c1e0c0595441dd5d773a25ba5b3ea77ec5cbf6809
File Path: C:\Windows\System32\wbem\NetTCPIP.dll
MD5: 3ace8e161000c4ce058f557ceda9ca7f
SHA1: f9fe0dca38a34f1caa84affcc0e1465cc3edb4d6
SHA256:345c179b0b4165841743718a98c808602a36c3904a817588c535ddeceae4664b
File Path: C:\Windows\System32\Netplwiz.exe
MD5: fecf7954a14046ec4714175741573a4e
SHA1: 4ee1d026a64701bff69636eae6100b59a4f3ce2d
SHA256:fbbc626a3880a0bdf87002fdce0a7d68330834aa314341f4eecba0ef54282ad6
File Path: C:\Windows\System32\NetworkBindingEngineMigPlugin.dll
MD5: 9fd96594b9214d1768c1e91fed695d09
SHA1: 112a884c702313b078209f654fd6ba00c46712fd
SHA256:e8c1fcc5f79dcb6b7a9022b4b8d32c6f11fc5800f28ff5bc05d33f438d675293
File Path: C:\Windows\System32\NetworkCollectionAgent.dll
MD5: 9bf3bc89f7958420d0ead168bc7a75a3
SHA1: 758dc501e4779b7c698aa3136815c3da400feead
SHA256:7374fe56a627b45554e59a61463d4cbe3b8cdfa2cacc4712b51cdbdc0199575d
File Path: C:\Windows\System32\NetworkDesktopSettings.dll
MD5: 6de2a90b76b4532fd87c15e4c3304d97
SHA1: 12032d15bb939242e6833bbaa760b9460dce299e
SHA256:0b10e37b5cd3544c18ae0a0191bb56bfcc0f7c4f047350d6d774b4a2bca86152
File Path: C:\Windows\System32\NetworkIcon.dll
MD5: 2359f5245feeab0ae3fcceb4c28fed1c
SHA1: cab15e20aa3592726d06ec531a00326cb85b7cd0
SHA256:45d1608755fb7db6ffa70bccfd722c6063d8cb91701be561194ce3f79e5ff761
File Path: C:\Windows\System32\NetworkMobileSettings.dll
MD5: 0dc231c83aa7af0c79382c3c406638b9
SHA1: b54a8f11620246ba73c6c33af5a1aa8c02ba4882
SHA256:5858c4789456525e4b98ace27b0c10ba9a73ceb3dca2bbb8bb11aa0c8ff0b01d
File Path: C:\Windows\System32\NetworkProxyCsp.dll
MD5: 10c384049b97f00a03da2b3f9cf38bff
SHA1: aaffcb0d06c2bc377d9a46e173127f7b41fad3ee
SHA256:524f316c8fede4a49ae23bbe6bf9710c9076b2b6fbeb6b32b4385620f4d035a5
File Path: C:\Windows\System32\NetworkQoSPolicyCSP.dll
MD5: 479ff067ac4dc3602d5bb9e914cb6437
SHA1: a1d7523dfdde66518524003f51df0e08fdcfd92b
SHA256:fce1e95ed39349bcf24d8d481071cfedbd6740370bd8a58ba86d17c80a3cc991
File Path: C:\Windows\System32\NetworkStatus.dll
MD5: 87987ef2c022ebce3542681599174052
SHA1: dd5bdd273459edd2acd54386cde4f045a540e901
SHA256:f306b801637c9fb93e6c16f3fa1db750617722459bc2ef33fd38873a2659a4b8
File Path: C:\Windows\System32\NetworkUXBroker.dll
MD5: 5201ac3d0daa4ab5b6c18db26ecfdd70
SHA1: a4131680190202089ed8a09568b020df31c8bd52
SHA256:a56af315aa83b82251372e54252f6cdd9ea28ad187cee21473a02a33c97277b5
Description:
Json.NET Schema Json.NET Schema is a complete and easy-to-use JSON Schema framework for .NET
File Path: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_9cf4db1a1fd1b22d\Newtonsoft.Json.Schema.dll
MD5: 742814aede6e55e5d5175b2e3d314cb9
SHA1: b78fd03f0bed4c1863eb0fe283721b56125ebd73
SHA256:cb8e9dbc0faa212bd0b4da42e6ff78eb6189338e823a47a5ad206044037fbca4
Newtonsoft.Json before version 13.0.1 is affected by a mishandling of exceptional conditions vulnerability. Crafted data that is passed to the JsonConvert.DeserializeObject method may trigger a StackOverflow exception resulting in denial of service. Depending on the usage of the library, an unauthenticated and remote attacker may be able to cause the denial of service condition.CWE-755 Improper Handling of Exceptional Conditions
Vulnerable Software & Versions:
Description:
Json.NET Json.NET is a popular high-performance JSON framework for .NET
File Path: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_12bdb8127c4c0458\Newtonsoft.Json.dll
MD5: d5aa9cc0d13f48472b425e0fc7d4e2f6
SHA1: 49bbc9165bc05589bd3246c84729a4fd00508db2
SHA256:137cd3e265d858165eb8815cd1dcd4a7752dfbdb92a45eb47956d47a6b5aae73
Newtonsoft.Json before version 13.0.1 is affected by a mishandling of exceptional conditions vulnerability. Crafted data that is passed to the JsonConvert.DeserializeObject method may trigger a StackOverflow exception resulting in denial of service. Depending on the usage of the library, an unauthenticated and remote attacker may be able to cause the denial of service condition.CWE-755 Improper Handling of Exceptional Conditions
Vulnerable Software & Versions:
Description:
Json.NET .NET 4.5 Json.NET is a popular high-performance JSON framework for .NET
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\Newtonsoft.Json.dll
MD5: d934f834458761483299b6f55364af2d
SHA1: a4a267df4f6b9a5b9c66143d339cd90507148181
SHA256:ce5053e9de13398c30f7e66ca92adf9b897dcb91a4d6b67f99c30bb8789f40f1
File Path: C:\Windows\System32\drivers\UMDF\NfcCx.dll
MD5: dc066d93cdd85afab63f188ca69a1479
SHA1: d169767ff5d562493dbffbb7abec57e6bdad30ac
SHA256:28de3bea210167dc0eb137305b012ded4e9ba5fdcaaccc61a053b7ca5c2c6aaa
File Path: C:\Windows\System32\NfcRadioMedia.dll
MD5: 110294e791f35e905df73fc7e76b3c25
SHA1: 39a65278375c01ad90de7455bb0c93d01d227034
SHA256:eac141cb55bd8a34d489e1e6cfa44c987fea59fa76b331b5a10ff06e9d6b3bf6
File Path: C:\Windows\System32\NgcCtnr.dll
MD5: 095657069cb78c720c56e7f2294c5018
SHA1: 2b5e23f4063daf92c1891e05b80421dca3ce1690
SHA256:1f50919ee5d1443781d312d61daa0c808ca2c04457c1cefe92cc71c09fcafe14
File Path: C:\Windows\System32\NgcCtnrGidsHandler.dll
MD5: 2b0c21a8aea2a08da0f2e8ce63e77001
SHA1: 5202a34204d573924cf000fdc859d739805f1cd5
SHA256:ca786326bba3c9c93a1d379f9cb2ec4094340852f087fb68ab242af1b23c1018
File Path: C:\Windows\System32\NgcCtnrSvc.dll
MD5: 69157ffb3e80b7883d2fd38cc661c0ef
SHA1: 6db38f1ed5eaac829970e2b62715d5f8147bf22d
SHA256:d5d2cb46a3ba95054530df09b80eec52ccf025d14ba16c75f2b40e46a694c19d
File Path: C:\Windows\System32\NgcIso.exe
MD5: ca756a807b48d86d7611953518d6565f
SHA1: 31020659660a10a501287e0895b3ee8e9b2a77c7
SHA256:09149f6c5f42991e02fcf3d3090d35fd38b50492521b3836844cd1e56262906f
File Path: C:\Windows\System32\NgcIsoCtnr.dll
MD5: 0f0f1da4f771d2af4236fadfad505a6b
SHA1: ca3257df57d949beff140655dd27f80074d81793
SHA256:bfd89447d1f13a3df59531067df9fce06b9a5376988d70e9b9002d429b4c6851
File Path: C:\Windows\System32\migration\NgcLocalAccountMigPlugin.dll
MD5: c5c1124aff638bd4918ce2e5af26cf87
SHA1: 91fc1068ee6cc89c2fcd2246374ab4ea6456fdcb
SHA256:8d9850127aa9236221b3e62b797ab400c10442e9251412835fc9aa3226d50040
File Path: C:\Windows\System32\NgcProCsp.dll
MD5: 1832027293c081e0a82320a881768c23
SHA1: 7d690d502fb44eaae41350f02962c8b444bb4b6f
SHA256:48bfa1f2fcee1da558e806630ec4e846f0d70b79d1b3f2b1257992e83f26b8ba
File Path: C:\Windows\System32\NlsData0000.dll
MD5: b6dfbe318a71d1fc6b63d8950e6a885c
SHA1: 17a5b8e920951a76fc027fe74d15c5ca7e2144d0
SHA256:b706004e785c10367a0097ab44ac0145d5db51d0b1a2876761d8e9395fcd93a9
File Path: C:\Windows\System32\NlsData0009.dll
MD5: ba7de46b50df15fb264871e45af24a3a
SHA1: b22e49008e24b5f9237089ccf43785a543666c46
SHA256:e2ba45e3f94646c7dc503fdd5d950fd23b4cbe155539ca539a992887d497d31f
File Path: C:\Windows\System32\NlsData081a.dll
MD5: f906eb7997385d0135d4aba4e4ed3e20
SHA1: 42cf3f6de442acb7f1f5bc32adaf4a77578f757e
SHA256:1af6aba3b8069b1d0a3898e436fa73069ed02ea04f63b7df7b771ab50f7ad276
File Path: C:\Windows\System32\NlsData0c1a.dll
MD5: 8f4c8ec577ed0b6c77dabea9cdd2c767
SHA1: 0b852cef41802bbf6554d8fca3e5263217983c14
SHA256:0f468c3c85635674eb4101162b2a3a59bad358193c5cbddaae520e48d975d55a
File Path: C:\Windows\System32\NlsLexicons0009.dll
MD5: 8d1283709a9303776c51a2fb9f6b408b
SHA1: 095bb5335aaa4160c1d247afcbb33ed880c89278
SHA256:869ad2d43857855a193fe5ad900b744031b646f9687fa21104915be3fa19c7c7
File Path: C:\Windows\System32\NlsLexicons081a.dll
MD5: 474a547e0641df4035e857aa7052bbfd
SHA1: 3436b58e12080dfeb0ecdccf5806b5cc65d1620e
SHA256:07349a5748ecaa1986d008f4beda50f68f32c45ad6695daf25e999c53e8a7887
File Path: C:\Windows\System32\NlsLexicons0c1a.dll
MD5: e5e290ec4b307684615aecf22b459e35
SHA1: c3db8bdfd72d551aa1e66cc078dc606da6ee2fd2
SHA256:ba4ccc27ab4086e11db4a1012578fd1d82274ab90d31d6bcf66c72db96c13585
File Path: C:\Windows\System32\Nlsdl.dll
MD5: 06a5a539226a458d24f302df11f0df6a
SHA1: ac015a82f5334d8a40d9f6e60b4eed44151235ad
SHA256:2b9027b9be21f82eb9ec408eddaeb57045747ed1dc946478fb61f20b0c603be0
File Path: C:\Windows\System32\NmaDirect.dll
MD5: ebe8e8026dc4fb8585650ac3622410c5
SHA1: 09e0e004a1ecd742b1bc82d47c4655c482136701
SHA256:b527e5fa3c1f0134af49f70f7b24e86ced00abbaf6efff0d0797069059f49b24
File Path: C:\Windows\System32\NotificationController.dll
MD5: 6b39eb5c22945acd7a456ff763adc71b
SHA1: eb6c9ad716fdfafb7d4156396849704fbdc9e742
SHA256:ccf27dc1294294ed99aa595dd56a7f8263dc9e6f7af97c2f6c20172c965af44b
File Path: C:\Windows\System32\NotificationControllerPS.dll
MD5: b538a5af958e34ad960c41e7c4b9a3e8
SHA1: 1d1b6d4888178bbed3b673686bbfe4418c3141ae
SHA256:08a112c078f396392cf0fc9da68f5eb61941d1961279034fd46ec48fe128879e
File Path: C:\Windows\System32\NtlmShared.dll
MD5: 73bc56b58f0d73e35eb17e0a107eba20
SHA1: e8590668d84a8fb5568c06448e0e5cef48bb82cc
SHA256:50aed92864bb3cc458fcda2166b1aed46e5dfa586333032e07594bda33a5bd2d
File Path: C:\Windows\System32\NvAgent.dll
MD5: 7aa441d5182f4f36bf2b4747c860267e
SHA1: bada91eafc96abc6cc247883533ffa28568ad76c
SHA256:f339231955aee410be58b592ade5b40327b3801cdc3a59388e07f88fc0c3eb9c
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvCCX.dll
MD5: 43041f317f83eabb8e968525b1bb6c7d
SHA1: 18f6820bda7477ee7d66890d9966f24d4c2e2a51
SHA256:7b7d7766f1b0ce08026dd8aaa7e5786ddf89ca698c69d2b0b172c897e56d1c8c
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvCCX32.dll
MD5: b6ee3df91d8ad2b52c8fc3e6cecc1e72
SHA1: b85f6c8cc1a5c2abfd9480569c66198aa4c8ed0c
SHA256:139a5ec8b6da81c5b543a3c69003cb9e840b7e37c70c6fcdf6a633ff0931f190
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvCamera\NvCamera32.dll
MD5: 6e7540dbac91922229d51f1543dfb1d5
SHA1: 253c16026dcf01eb4ac30f01a9b84db5629a9816
SHA256:d4685d868f44ccb3e56927348f7aedc52b1d568c7bb6c7464814348013beab21
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvCamera\NvCamera64.dll
MD5: 2bd3c11486e5c760bb1c2f0354ffa21f
SHA1: 8236b24cde875ba50617ccbb4271dec7d7f06e1e
SHA256:26ab9b080b82e95e93c9ebee339f9dc1585db55c823ebc66fbfcbaa54b0e90ad
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvCamera\NvCameraAllowlisting32.dll
MD5: 74e79f70e251644ea30426c0c5051ca1
SHA1: 5562232a1602cfcaf184aa3d9b6ee409f18cc53b
SHA256:118fd8514858a2dd221ee8008e4fa7cc0809d3848bb71bb936689612e1231060
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvCamera\NvCameraAllowlisting64.dll
MD5: 84d74ece98a659bd2cdc03e8ee19e69c
SHA1: 064edf25a65055d6d6eb5e13b04dd77d2f4e0d7f
SHA256:9ce5ca31d64a543149fa2ef844605ed6184b8b8e388a64bd2a86c728105d6049
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvCamera\NvCameraEnable.exe
MD5: 1f3886b932a42d23c58c6ce4120cb7ba
SHA1: fb91b6e3bd484bb7b96f812f5a41533c87b3c48b
SHA256:cd9f3f67f1fb6b72b877f09205dc46c7e2045faa61b24112faa607573010bde5
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvFBC.dll
MD5: ff5ee34aa7720dc9c4f2ec3c2f39efba
SHA1: 2d7eef24b79c4607ab409f16d9687ec635dd33e6
SHA256:7a8d558ac021a9a7c8ea61dac2d644430c58678e9aea6e2a7f8c02b6f4692327
File Path: C:\Windows\System32\NvFBC64.dll
MD5: 3b1774e63fadf4dbe9ccdac0d0451477
SHA1: 262894c26ab58a01ea547f960379e1e573e7f3f3
SHA256:e17849c498fba3989d94eead89e34b9e2df62d7296f0666cb1ca21dfe163097a
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\Display.NvContainer\plugins\Session\NvFBCPlugin.dll
MD5: 7aa6d42492774f45f46689200f78ee76
SHA1: f91adaa3cce19e3591eeb3ab9124e2f8c46f9ecf
SHA256:179b0e2243c6b3e0d83dc94d6e896e2d8440131bde3ee573695a160a42348a57
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvIFR.dll
MD5: 6d8560ec847acec1fa88c9295f40406b
SHA1: 5daa52ba91296a9469745cb03e76f185f41266fd
SHA256:15188b4e6fffb0f18c1f03690e2c75f8677787f22de19e7edacc55a115f56fb6
File Path: C:\Windows\System32\NvIFR64.dll
MD5: 1eaff360235d8c009d3c60fb11169efe
SHA1: 57d98b7adf20b277173c0cb3c11f5556c1b7652b
SHA256:032b510e18512ab686ffb793c4955038b142e6e2a9a686c6a011c2e066c82cbf
File Path: C:\Windows\System32\NvIFROpenGL.dll
MD5: 5733e2f6b62ab47fbdf3b927e735315e
SHA1: 7720cdb399ffdbcca7f37de576b8602267aed376
SHA256:fe89e0efe239cf55385e354212a47784228fd891283256779d3f618dc4aa196f
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvIFROpenGL32.dll
MD5: 1d1429edaeb576a154e72b3a1b6dbf75
SHA1: 3276140700b94a1aca833b8c3aeb1c92a77e1e68
SHA256:afc439efe93a05073ee68cbf2957f5ef88d182eb60e8066dc4bdd11bacfe8a92
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvCamera\NvImageConvert32.exe
MD5: 6517449d0b82ed70113c9072ff6e5477
SHA1: e1002b1fcd4b2f17383b60b642e111c5b0389314
SHA256:3c9aab766544dbc4d38026eece082800184bd4fe2152cdd3364124db35c726a2
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvCamera\NvImageConvert64.exe
MD5: d6373347fd180d58f0f82aacba0ee93d
SHA1: b71e14a59e3eb938be2dae13282d2ef5fa205f32
SHA256:4e4ad5175c7fd4d80091bb26f65f1a5fb3bdf5a6830e0ce0fa55794af474fc47
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvInstallerUtil.dll
MD5: 31c502e1670e4da4d40f949e5896a390
SHA1: da81ba182c7d2a26c2df7b76c4f07bd4f0560cd0
SHA256:a0a524bd2633a3303a4e7143c82efbc9707bd239b44381c20d0fc540645cae92
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvTelemetry64.dll
MD5: c3525fb214e88d136ee4e377c8f2fa67
SHA1: 9aa469f1a6c1a976c66a6eabbd1abc42c0e9a689
SHA256:1f05493907f9f604eccfba56c5706565ae1eaeec9403246de27c3fd70df52b87
An issue was discovered in the telemetry crate through 2021-02-17 for Rust. There is a drop of uninitialized memory if a value.clone() call panics within misc::vec_with_size().CWE-908 Use of Uninitialized Resource
Vulnerable Software & Versions:
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\Display.NvContainer\plugins\LocalSystem\NvXDCore.dll
MD5: 7eace3417968f45b79e65fcaa072d0f6
SHA1: 64b18ed3b7b226cfab1449d8deae97931c93b660
SHA256:564cda64c527cc47679d71f851365c157e1abc9cd33e19cff76d9f827d6f9427
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\Display.NvContainer\plugins\LocalSystem\NvcDispCorePlugin.dll
MD5: f839bd99a867a16406d75289505bc8d2
SHA1: bc23b39ef6d89019470a7916f9ae0057e1919c12
SHA256:e85b682606f981f84f9800561fe0e5d24f90ccd21b0a4d8a13407594bce3f906
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\Display.NvContainer\plugins\LocalSystem\NvcDispWatchdog.dll
MD5: 9d23432958cf016307b000fd1bdfeff5
SHA1: 18b3dff3e7ca790fb2a60a979ecfabe7e0a5a384
SHA256:c23e06f9526caa146ef77db90dbd91490502befbe57a0abb04ec00f23c64676a
File Path: C:\Windows\System32\OEMDefaultAssociations.dll
MD5: 0fcfebe7c4d5b8ef2f1d3ddf41927347
SHA1: 753369907430c23c0effa6a4a0e87ee6bba65a5d
SHA256:1c572abf02db6c6eef20f0d978980a08f7818f44835b5c3f05cf6d3b65b93b6b
File Path: C:\Windows\System32\DriverStore\FileRepository\prnge001.inf_amd64_1daeee8f3aa30fcb\Amd64\OK9IBRES.DLL
MD5: 3752159704300999ef2b8d57b37bff4c
SHA1: 286d3b46abe3a73d2045b4f2e8b4aac2c0e51ad1
SHA256:e066fa2980090388bf1eb0be2827286de84b96278f30afe25b1514a910492ad1
File Path: C:\Windows\System32\OOBE-Maintenance.exe
MD5: 7c5cc289660882a93e9eb5d2c216bc26
SHA1: 3112c0370e51d1e4976e11ab60eaa81efbc627e8
SHA256:a4bf9c57297e2aa0c899e5161290539f3a68f289f3e0e73edf753018abeead11
File Path: C:\Windows\System32\Dism\OSProvider.dll
MD5: 684fca651758ba405144d5fcab6ab7fe
SHA1: da595c60fbc4336fd2c61b45384dc0dbc3bf599a
SHA256:ae9b66a6e0b1949890241c67037cef2c59d4f4faef84849789e0fee9184f41c6
File Path: C:\Windows\System32\OcpUpdateAgent.dll
MD5: ea437f4089d5a353ca996a08f9924897
SHA1: e1db483dd87ad4ca75e96a990a7d6f0e06f2eff7
SHA256:c62ac1252566d828f9df2fa1c37e6b5c808af508824774f49669d62bf4ebfe07
File Path: C:\Windows\System32\Dism\OfflineSetupProvider.dll
MD5: db1c840507ea36d04d8f8f503804daad
SHA1: 990152a67191059ac486074f0a50b97b840bd8e3
SHA256:23fac2578e222a023c7b67186d67070518c17f08a6c39644fbef76293751efc4
File Path: C:\Windows\System32\OmaDmAgent.dll
MD5: 8d271ee639f62edc26e8c8c443374276
SHA1: 54eb58ed955abaf9066973b88abb839f2a72d473
SHA256:da15e184860ba1bafe01ea2f01a47c2130f0afb84f4ac5d0542551da8844fdb0
File Path: C:\Windows\System32\OnDemandBrokerClient.dll
MD5: 1e3b2a39f0e5e54b8eeb747772c35912
SHA1: be03d1d0a99d0c685c79172c21605646b8c2993b
SHA256:447f3e7c1cf83c122fcf2bcdce25fca773a24c6bfe3c07c35f7437d594c769e0
File Path: C:\Windows\System32\OnDemandConnRouteHelper.dll
MD5: 0ac681d969c2ba2a29daacd41a9032ef
SHA1: 2622968157d79e235b883b4ea20183c4d6b5d3b2
SHA256:2dbe0374cc23f11f663e72b6b9b8209041570b6604dc946fc092705d38b36c0c
Description:
OneApp.IGCC.CommunicationService
File Path: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_12bdb8127c4c0458\OneApp.IGCC.CommunicationService.dll
MD5: ca0315643b5f4be726f1d240eca6f792
SHA1: fb05b76bcbd78b2bee390dc1f4a90a541a33d579
SHA256:ce2a8654d69eeb3fdd5d63004ec873d9214f878e29b2e2cfbfa43fdf86c06248
A vulnerability, which was classified as critical, has been found in uakfdotb oneapp. This issue affects some unknown processing. The manipulation leads to sql injection. The attack may be initiated remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 5413ac804f1b09f9decc46a6c37b08352c49669c. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221483.CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Vulnerable Software & Versions:
Description:
OneApp.IGCC.CommunicationService Intel® Graphics Command Center
File Path: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_9cf4db1a1fd1b22d\OneApp.IGCC.CommunicationService.dll
MD5: 5f637be3cb9d0ea5b2bc3d28bb419b0e
SHA1: 9813c2aedda2a1d85217d83b4b78077a0bdb04e5
SHA256:1e17dc79d2fcd3e5c7ad3f611a0786b5d554aecfa32fa17795ab1544d60aa3f2
A vulnerability, which was classified as critical, has been found in uakfdotb oneapp. This issue affects some unknown processing. The manipulation leads to sql injection. The attack may be initiated remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 5413ac804f1b09f9decc46a6c37b08352c49669c. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221483.CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Vulnerable Software & Versions:
Description:
OneApp.IGCC.CoreLibrary
File Path: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_12bdb8127c4c0458\OneApp.IGCC.CoreLibrary.dll
MD5: 5097a63c20cef0ac98b8295259b094f7
SHA1: 2b98b228c10ee07666c1fe513cfbf362d150118a
SHA256:64b8ef4d0c47f82d97efd3daa480a8c17b49585b703da53897bb4e839ee6f474
A vulnerability, which was classified as critical, has been found in uakfdotb oneapp. This issue affects some unknown processing. The manipulation leads to sql injection. The attack may be initiated remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 5413ac804f1b09f9decc46a6c37b08352c49669c. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221483.CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Vulnerable Software & Versions:
Description:
OneApp.IGCC.CoreLibrary
File Path: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_9cf4db1a1fd1b22d\OneApp.IGCC.CoreLibrary.dll
MD5: 622db83a630091193387fa579044c9b8
SHA1: ccfd574f47d6152790c4bdac0d8e1f719c4fceb6
SHA256:f93a396ccf40a3c704888d22ac521d84106f7b68def8c0c8545ba95f6828cc7f
A vulnerability, which was classified as critical, has been found in uakfdotb oneapp. This issue affects some unknown processing. The manipulation leads to sql injection. The attack may be initiated remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 5413ac804f1b09f9decc46a6c37b08352c49669c. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221483.CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Vulnerable Software & Versions:
Description:
OneApp.IGCC.SDKCommandLine
File Path: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_12bdb8127c4c0458\OneApp.IGCC.SDKCommandLine.exe
MD5: 08528d8453aedd37fbeb635a514b9889
SHA1: 05c8292cf2bd24be16887a6013013489c5c2eb50
SHA256:04e9cbf7be3410f7bc65c4fe6d10ee8f88367513b58efa11bd7c3d5c90b5bcb7
A vulnerability, which was classified as critical, has been found in uakfdotb oneapp. This issue affects some unknown processing. The manipulation leads to sql injection. The attack may be initiated remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 5413ac804f1b09f9decc46a6c37b08352c49669c. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221483.CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Vulnerable Software & Versions:
LINE for Android version 5.0.2 and earlier and LINE for iOS version 5.0.0 and earlier are vulnerable to MITM (man-in-the-middle) attack since the application allows non-SSL/TLS communications. As a result, any API may be invoked from a script injected by a MITM (man-in-the-middle) attacker.CWE-924 Improper Enforcement of Message Integrity During Transmission in a Communication Channel
Vulnerable Software & Versions: (show all)
Description:
OneApp.IGCC.SDKCommandLine Intel® Graphics Command Center
File Path: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_9cf4db1a1fd1b22d\OneApp.IGCC.SDKCommandLine.exe
MD5: a476e22e3683e9cc613f64ebccb288db
SHA1: f2a37adf3140e798a7072956bb713d5855947a7a
SHA256:225f3fe7400d5cd47e09c39c5125f282fb3c3c63aa025775a60ae7984d3468e1
A vulnerability, which was classified as critical, has been found in uakfdotb oneapp. This issue affects some unknown processing. The manipulation leads to sql injection. The attack may be initiated remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 5413ac804f1b09f9decc46a6c37b08352c49669c. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221483.CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Vulnerable Software & Versions:
LINE for Android version 5.0.2 and earlier and LINE for iOS version 5.0.0 and earlier are vulnerable to MITM (man-in-the-middle) attack since the application allows non-SSL/TLS communications. As a result, any API may be invoked from a script injected by a MITM (man-in-the-middle) attacker.CWE-924 Improper Enforcement of Message Integrity During Transmission in a Communication Channel
Vulnerable Software & Versions: (show all)
Description:
OneApp.IGCC.WinService
File Path: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_12bdb8127c4c0458\OneApp.IGCC.WinService.exe
MD5: 78ecc319b835bcdc3e9d98ff82e063d5
SHA1: d7e88e6a62e4e7e7307f6eb1ee40be64ef0e37e7
SHA256:e0fe433fb502a98b6f1d1f63b20157d3ae79e7da14bf83eb900febd29aee80f3
A vulnerability, which was classified as critical, has been found in uakfdotb oneapp. This issue affects some unknown processing. The manipulation leads to sql injection. The attack may be initiated remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 5413ac804f1b09f9decc46a6c37b08352c49669c. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221483.CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Vulnerable Software & Versions:
Description:
Intel® Graphics Command Center Service Intel® Graphics Command Center
File Path: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_9cf4db1a1fd1b22d\OneApp.IGCC.WinService.exe
MD5: 565ec4e1325a86a4baa5df1d2340c817
SHA1: aaf68213f883438539160438f1055006e3ac3c37
SHA256:c3a3769ce7562611b0619bacdd7c2ac95d60904a3949a8afbb29feecf494e247
A vulnerability, which was classified as critical, has been found in uakfdotb oneapp. This issue affects some unknown processing. The manipulation leads to sql injection. The attack may be initiated remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 5413ac804f1b09f9decc46a6c37b08352c49669c. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221483.CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Vulnerable Software & Versions:
Description:
Intel® Graphics Command Center Service Intel® Graphics Command Center
File Path: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_a9a2dde7124f013f\OneApp.IGCC.WinService.exe
MD5: 1d4b7ed47331dc74828cafea801d152c
SHA1: 977c5976152f0ef9e8cd141193eb8a1fb292d0f3
SHA256:918ff08c12fb06d97a12522121b7e6c8435344d5592118137127639a34fe5abe
A vulnerability, which was classified as critical, has been found in uakfdotb oneapp. This issue affects some unknown processing. The manipulation leads to sql injection. The attack may be initiated remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 5413ac804f1b09f9decc46a6c37b08352c49669c. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221483.CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Vulnerable Software & Versions:
File Path: C:\Windows\System32\OneBackupHandler.dll
MD5: 787e00b79f29a8add097b3094f8ccc12
SHA1: 40d710ec9709a6753621430faa4e32b9838499e4
SHA256:b971ff9cf93bd2457de3a2ac36b9277ca81452a0271dbb0bea1f2c55d613b7f2
File Path: C:\Windows\System32\OneCoreCommonProxyStub.dll
MD5: 3cc32f451cb0ca9e089742276dc5e9a9
SHA1: 0c8d6d5c9bba16d79436ea8352f44478720b014b
SHA256:ba98ee6b92238317b747680255c58cc0fec3bb40e05efc3d0bee42b7faba5b5f
File Path: C:\Windows\System32\OneCoreUAPCommonProxyStub.dll
MD5: e356f530f21458f224056c15b7abfa9e
SHA1: 2cf6b3cbafbab59796ce69e08aa219fe659bcfdc
SHA256:590abece8d6fee42f7395f376a0f9a7825b1863fc789812135eee100f59bb48e
File Path: C:\Windows\System32\OneDriveSettingSyncProvider.dll
MD5: a6ee498bd9d5e4bd03aa51e8bcd96fc4
SHA1: 0fcc4a0f250cb359cd3c374d39ee560bcad52161
SHA256:bf64cd72be04b840f1cc406c5b59b715efebb1bbd2ce0c081188a42705fc7db8
File Path: C:\Windows\System32\OneSettingsClient.dll
MD5: 6de0929f91a9911aeeef2c82f4e5ab23
SHA1: 9d08b309153b68c40c8743f4f3d0fd55a7c9fda8
SHA256:0de60e9177b243fda76d81c55ff7ee08c76dd937cba68d16c49c4014290d3ed4
File Path: C:\Windows\System32\OpcServices.dll
MD5: ab01423907565f4f40929134f2d13e5c
SHA1: fea47b8c9ba0d0ad4b83911ae7e3bbc4a193424d
SHA256:0f2ddb1732c5c3bcacf47abc6ec9e3d266f2e4cc0c99d79bfda48b156861f286
File Path: C:\Windows\System32\OpenCL.dll
MD5: 5954d7fff96149c9cc96c8cd2aa8b5f0
SHA1: c3f98e12c1eede2b4124bb47f971d2995e9a9008
SHA256:28a712388e284a432277225d701ffae808e287f7b5c00deee2362786bca45db9
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\OpenCL32.dll
MD5: 4e4def7e9cb75ee3e037c00c44e383d6
SHA1: 30771945d93dde0a0a4e19f6ced0ae1737235528
SHA256:ceb50dfeb70a15659e35ae1569efd5c9e1029c34ff522b14e781d8ac6f8da1e1
File Path: C:\Windows\System32\OpenWith.exe
MD5: 28d43d793ae5e43262f1e8eb2bdbe78a
SHA1: 9b347eb9a6adb40a0da3e7872bd271e8d66f651b
SHA256:6d7b049c9db1b5ba8d6974d08ef7cc7d19ff0fa23ff24cdb13399b8411ab314c
File Path: C:\Windows\System32\DriverStore\FileRepository\iastorac.inf_amd64_6ca78a08b838e305\Optane.dll
MD5: df5d549878f3014ffeb4048022a9ec27
SHA1: 1b7e77f220d718c83f0aa50fae31195fde78fe57
SHA256:41fee22a9d3b73dbf2a88d0e523c801c8982213085abcf49a313723e567321f7
File Path: C:\Windows\System32\DriverStore\FileRepository\iastorac.inf_amd64_6ca78a08b838e305\OptaneEventLogMsg.dll
MD5: 39cb8a6d6a19bc9d454dc33e658635b1
SHA1: c3d4d655916d48faf2755ba7f33a1951378bb6d3
SHA256:db752092e9ed379bced3677f736067ad83acd88ebd56180a4c94fe076bbbe0b2
File Path: C:\Windows\System32\OptionalFeatures.exe
MD5: d23198540a58bfff1b6c4c4d3422900e
SHA1: a975dd6386d9eca0030a172c6fe6c827b5a321cc
SHA256:90162992c0ec19d90805d669ceef7609395792ed735d289eae91bbce47802d39
File Path: C:\Windows\System32\OskSupport.dll
MD5: 6624033f22411924bea3ad72e7487bb0
SHA1: 64bb79c9a55b32aa1e7461396ae26e2f736fd3b2
SHA256:60a7d1ec0eaf1fa3368351942f6bfcd773101b569ba0f3fd986127500514f4e5
File Path: C:\Windows\System32\P2P.dll
MD5: aa1378562dd21fafb78ba2476d68407a
SHA1: f139e279681b1e83961f95e3c18c966952d0a95b
SHA256:b568243561c3a7fafce0c8281574968e6e675a94519e82e1c355759bd3790d66
File Path: C:\Windows\System32\P2PGraph.dll
MD5: 20c1bc2670b5f898399bb0bc228490de
SHA1: b67fc3770c0f128f4a2e10555563dae5d718df9b
SHA256:2e875eb61bff93d0fe73dbd4660ab4bad0a7483e3f87e608d741823d77082fb2
File Path: C:\Windows\System32\PATHPING.EXE
MD5: 30a75901664ff9eb870b68d9364ceb8a
SHA1: 83389dddd22045b608f542ba075e46f16cfca7c7
SHA256:348fb606016a1d9d7a1791a2fd561cf58b2b22165cf3c204ff9c541911078f59
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_amd64_8418b8585d9586f6\Amd64\PCL4RES.DLL
MD5: 410ff58eea0177ad87c688f872d256fe
SHA1: a4e18a2caa9f15302d5246a9c9361c9e30e50c54
SHA256:1d47c301b65b78f7a96f3e2014562c8bff54564ece84076f37580da2d7e43235
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_x86_8418b8585d9586f6\I386\PCL4RES.DLL
MD5: b5b6fc9070b60cdd7e1764c24580bd67
SHA1: 81b56798983aabb5cb0f18c39c8597a49c734e1e
SHA256:c14121ab4aa72d5e7752b4a0ccfec5956dc973c427178c548b3ef75ff692d505
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_amd64_8418b8585d9586f6\Amd64\PCL5ERES.DLL
MD5: efe196c7f14908396e49bcc8b08d0403
SHA1: 48929fb6e21f8ce13cd5d4e67cec6aaaf7be4f13
SHA256:de72e0bb14ccadb946b3d9683fa69fac8677f8162ba66fd2e4631f740fe1c0e0
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_x86_8418b8585d9586f6\I386\PCL5ERES.DLL
MD5: 6ab12ff386e4589029bca61ca6b634bd
SHA1: f040c0518eec54b25dcbc57234dcd8975622dbf1
SHA256:ea519d5540882e5225fb60f35ef0c5598ee778e16fea94f8b9d3dc9522744dca
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_amd64_8418b8585d9586f6\Amd64\PCL5URES.DLL
MD5: ba3204bfdacae28866b90359ef64159a
SHA1: f21dda996f72d56dd37ad06b15231e5eab72a6bd
SHA256:2de65a838935b16aefb774d581807b575b6861d2a6a8d69e1ab44efc6e74d661
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_x86_8418b8585d9586f6\I386\PCL5URES.DLL
MD5: ddb1e0503c976e1e84b84da160b012c6
SHA1: 0bf2d7a26bb5bb4e901b0d2f3e625796b4943b55
SHA256:2c15ca038ce761d7069afac4fcdabfd07994e968375512c4091e8892f8396db2
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_amd64_8418b8585d9586f6\Amd64\PCLXL.DLL
MD5: f9b86108895d2cfb7b1066b3e24b1f27
SHA1: d8f7549d3ae484e4284f5ad9f233fb00cbd1d175
SHA256:36765c4c05cd43bd30c031bac234c2299059ba01f970c07b70d5c57aaea76565
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_x86_8418b8585d9586f6\I386\PCLXL.DLL
MD5: 3eef4f6f70158391f7110b0b0de6141a
SHA1: c7b96294ca0521e332b85a79cebaf6eee2d3eb56
SHA256:9fed0031a4fb07c5961a368767bf28e93f6d9b5c621e8ea2858eb81e707c285d
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint4.inf_amd64_1987ca3a0b344cfd\Amd64\PCLmRenderFilter.dll
MD5: 3eadf934dbb6f31f5cd671b5f7717cdb
SHA1: a26df5302d6d7a4b68d3336d0028bf7551770258
SHA256:83211c64537ef5ce774ea21169457be24aeffd10bdcec073e1adbd1bd1e36dd2
File Path: C:\Windows\System32\PCPKsp.dll
MD5: 337a4d10c320895296905c4b672ee6bf
SHA1: 5879d531ba8b2df5a586b2af36525a13767f38fe
SHA256:b3c97a2889416894176755b7c4fca461981c81dc4a95bf5e74d6aeaeb5b2ff30
File Path: C:\Windows\System32\PCShellCommonProxyStub.dll
MD5: ae838958313611697cfb34a582167c33
SHA1: 52bd3ef8472674ed358d78241d832a28ee37c600
SHA256:17d993fc6f021a68318ec74621d11e8a25f5762e029dbc995afcb8cd3b2e3fd5
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint4.inf_amd64_1987ca3a0b344cfd\Amd64\PDFRenderFilter.dll
MD5: b7bfeeb4cf122c780a7a315ccec01c5d
SHA1: 2386ad652adb50a21bea3eac43b84141f7685c44
SHA256:112131d654b1360e454909d8d418502534a4cc37ec00b34fd1e355a1feeaaea0
File Path: C:\Windows\System32\PING.EXE
MD5: 2f46799d79d22ac72c241ec0322b011d
SHA1: 9c13c854a4ef98879d0cab80ef679b4c4eccf518
SHA256:7af50fa112932ea3284f7821b2eea2b7582f558dba897231bb82182003c29f8b
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_amd64_8418b8585d9586f6\Amd64\PJLMON.DLL
MD5: f4babd0cce8a20a4b5348768d0e98342
SHA1: bc83f3cd523a8ec45921f91ac58633ef2ed6f080
SHA256:a713793d4a1d6f538b09d54a5e08bf35698bd8455cdc2b9b52373c2c22c3f261
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_x86_8418b8585d9586f6\I386\PJLMON.DLL
MD5: 5490038a5ee6ab3deec8e1e95de07438
SHA1: d1048334ddb86c496342f7afb913d490aaef7db2
SHA256:f558399cf7356774669608fdd99cdbf22198905a1d15d6be23c0fece1bad20eb
File Path: C:\Windows\System32\PNPXAssoc.dll
MD5: 0a21762cbd01db0d415246ab82fd0520
SHA1: 1c73ac164e9c7b5cfebf623ccb813d0c44caac5d
SHA256:8b32c3d9715df87d64a599b771f8c98b640561a96e4e5bf8270fcf4a33faeab4
File Path: C:\Windows\System32\PNPXAssocPrx.dll
MD5: f504577f5b2710c598bdcf5843336c75
SHA1: bba6d12bccb5f6bec3fd77cb61089f00f333ea4a
SHA256:41695f841d6cd96cf06bd4ed318d3b71c60d98af7fa4cbdced19ebd8a320e4b3
File Path: C:\Windows\System32\POSyncServices.dll
MD5: 20f0608654b79c841c28d5b1079071e2
SHA1: cbc26a062daeda9f118e91feae1780df92263c40
SHA256:337ec998cf4809c398778d8a0552fc6ad9549dfcef7becbf26e710660de4483a
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_amd64_8418b8585d9586f6\Amd64\PS5UI.DLL
MD5: 5d6f0076becad63644a3fd4b2ae8dc51
SHA1: 49c59285a8f9739e69556518b15d570bdcae6a59
SHA256:8f28a10bde0b78ebaec45e236c6031aaf147780b260a398996db78391c4c530e
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_x86_8418b8585d9586f6\I386\PS5UI.DLL
MD5: 9519fe64f4cfc029d60e0dccb9594cd8
SHA1: 7f9e57bf9a584b9f47fbd4c14f62eabe68a5e9b5
SHA256:bfe5ef63ae345476ea360095709da6827e2b550bf878bf2a5f83879067c300fa
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_amd64_8418b8585d9586f6\Amd64\PSCRIPT5.DLL
MD5: 1acc48679799b6291ac551ced8f0eb5e
SHA1: 381ed98207787e2336bd028e747c9b603811adfc
SHA256:f1eb8de8917b21759493ac62f7b271c6dbdc2512cfd60e9c20f30ab6727bcc9c
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_x86_8418b8585d9586f6\I386\PSCRIPT5.DLL
MD5: 6fdb205f9573f74b5f8c4a4625221a58
SHA1: 86c5213b845e93cdc8680d97810bcc83c356a804
SHA256:36dfe16c230beb6aa9f0bd8ff839543825c860604fcb87d4783b5d765d05b9d3
File Path: C:\Windows\System32\dsc\PSDSCFileDownloadManagerEvents.dll
MD5: 24448bc302f7c6ab4761a95a61fb4204
SHA1: 8f4966e61e12d3e5c1b1524af27aff730cb95930
SHA256:57307781d803fc82835159a93ce9da0ff173e940173781c10bb8a2767948a170
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\PSEvents.dll
MD5: 1ea0872d4ee9c7b1fe9c05ff8028aec6
SHA1: 97c340c544be60fcf7ce8c503e349f5f47c1c049
SHA256:7b080695b7b928f1edb735760e250649c4f4a8a9ae218d5fb66be5a4e11d1343
File Path: C:\Windows\System32\PSHED.DLL
MD5: dc61643cd353aa826f2b8df06422b266
SHA1: 7ec8f511717a71f692a79a27e348c6654d0d6f40
SHA256:27858972c18afccd944453b72feeeba66b1587f2075087780aa4fc54202d8221
File Path: C:\Windows\System32\PSModuleDiscoveryProvider.dll
MD5: 71ae723631bcb364be26f990c19405f7
SHA1: 0e1da46cefd466ebb0d666bb14999ca77d82454c
SHA256:d137ee19099b85a1e73fe014148fb332e1cd2b02ee26a8d08427d40c4799f73f
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint4.inf_amd64_1987ca3a0b344cfd\Amd64\PWGRRenderFilter.dll
MD5: 7569e016fde4346ddfc5b9b1debf3244
SHA1: 054265ca0becc05137ea6b5b067a8dd7718ea559
SHA256:dc88cdf595c38a374b82b238ef7b02bf0bbe9243d2d2aa8757f4fe51baa827bb
File Path: C:\Windows\System32\PackageInspector.exe
MD5: a128a0b6961768391516e71db936e4e4
SHA1: 148cc949edd24d9227736c75a831df2be746a7c5
SHA256:adf1880a66c7ffab61f60dbb27145a0dccbc7b7726ac750896ff2b7e79a31064
File Path: C:\Windows\System32\PackageStateChangeHandler.dll
MD5: f3e8faa7b5aa1b114b54795f521f495e
SHA1: 6e950e8c4224239521ef15996f5d6b5baeaf3024
SHA256:45f557c75d0fe53b8f755d9b4e6853438ee07324d93ed76d6a008d03a27bf9dd
File Path: C:\Windows\System32\PackageStateRoaming.dll
MD5: bc0ab47f5e259de9ee9bd63ab179f40f
SHA1: 4a701e9ac2682f8721ade80e700ee4c9b3a0e262
SHA256:5d1311c47031da8dfcee00e7e649d9c5be7a2a82d36fbc16ab49dca084959cea
File Path: C:\Windows\System32\PackagedCWALauncher.exe
MD5: b1d3bc9f771f304c15b05935a1f67928
SHA1: 78a4b810999d378f880b3addbb99809d36fce91a
SHA256:9df7c8f807ba44ebe2fa905723a316e512188cfda09e96a43058b0a9d9d10d3d
File Path: C:\Windows\System32\PasswordEnrollmentManager.dll
MD5: bc82de9c5467629d844f72e207104a5b
SHA1: e9773e676c23d70b2d025be6056ae4532fc3e56b
SHA256:d9ad24e003762eb62fc51b0ed4a8d8ce5da6707070437a8c7671ab02af7e08ad
File Path: C:\Windows\System32\PasswordOnWakeSettingFlyout.exe
MD5: e60f225e33ab18bd91015e9e08d4d022
SHA1: 34c33d87799c4c994fc49896e3290c2a355dd592
SHA256:999620939a3c34c33aeffb205f36c99bb08f72fddd156059053db8b6a3e29635
File Path: C:\Windows\System32\PayloadRestrictions.dll
MD5: 121dd97881bd6856226c78f699de73f2
SHA1: 42460290ceaa0d010448330c0b33b334fe88947f
SHA256:16b1a65423be8c811734c9a5c453cd1ec97ccb8a5ddf491f891aece040ce4bdf
File Path: C:\Windows\System32\PaymentMediatorServiceProxy.dll
MD5: 0fd6cf62c0b3157d6e9cb12659508bfe
SHA1: 4cd443a12b6abce064d0e0ef4f4925e284db6d14
SHA256:76056025d292f606a482a9217209d0aca1dadd244d258c293e097082b947a255
File Path: C:\Windows\System32\PeerDist.dll
MD5: 686469236816ac233932211c8dda88ef
SHA1: 145035ff87bf8cfabe6fd835c565f11bedd71b8d
SHA256:69862ddb4227357d69a3c692d39801f2c9a6f59bd7579dbee7a19d96f1229fc8
File Path: C:\Windows\System32\PeerDistAD.dll
MD5: 06df2cccbdd050169fc836acf4bd1c8d
SHA1: 64178f6212174926e5a86ece49d5c734e48edc29
SHA256:3e15f4ce34238a1005b7215b803f29d268155f155691d70de5f3ec9225d25d0d
File Path: C:\Windows\System32\PeerDistCacheProvider.dll
MD5: d1dd2995f13792d2e3c58e41e6b2ddac
SHA1: 76c028c9cf7deda4b4d34359e409e945a5bfaf16
SHA256:222d0a23f58cf4da5627fe91505c614fa4dcab0519312df42bc1b8b7eb50ec85
File Path: C:\Windows\System32\PeerDistCleaner.dll
MD5: 878253394e6dc19be7e4e719134a7f14
SHA1: 667006366dee470adb232d83694c47ba900dd860
SHA256:8c134be3b7688905213ca4f07f1887aa9dee4da7c17aa2541ecf0c9b130b733f
File Path: C:\Windows\System32\PeerDistHttpTrans.dll
MD5: 33a7a1804f60a331531b34d79b788920
SHA1: fff09190c8cc517ff273f8b266621fde4956c2b9
SHA256:c63934a587d0631446c641fcb1a28aaed06adb6772f04cc944a6e1ce7aebdfcc
File Path: C:\Windows\System32\PeerDistSh.dll
MD5: 5913233f481c6a74e4b6a79540ea4d0f
SHA1: b4a8f7eab029ac187fb6a64799ad6b316ffde9e8
SHA256:64bc6b60c068d82956cf7b9e0de1e4d252d3ddb5c375d8a636f324ff1fd5556e
File Path: C:\Windows\System32\PeerDistSvc.dll
MD5: cd1b92f120bfbea80278c3ee9a467b53
SHA1: 9e947464706f5b449a45970d75673258464a5ebd
SHA256:5d4b8ea8b6fb13a6e5c0fbf5b0b425dbaeb2613e699c5eab348af9c3a4419a57
File Path: C:\Windows\System32\PeerDistWSDDiscoProv.dll
MD5: 53ea21623318ce64fbad1e88df99b046
SHA1: 68cffc98b636b909777f38be42ab5e0946fd9be6
SHA256:66ec4fbbcc3042b4141a1c46c032b39a0d4d74e5e07508e6dddeb5c51030aa1a
File Path: C:\Windows\System32\PeopleAPIs.dll
MD5: 49b17fdf96205d96718ba1159e418fee
SHA1: 6e5a970b37e301f3671f21713f67142225a71856
SHA256:14a71e20352a078ce4bb77b3738ffc2604527d2579710011a6f651a1c46c91e6
File Path: C:\Windows\System32\PeopleBand.dll
MD5: 3a7e281d25a36e4a2ca61f0e378f05fe
SHA1: b967f4b89c9e360aa39d38db861801955a348f72
SHA256:145711afa7ec5a0c104f2e7bbb755734cb483031878d2e46410a29bb6e7a7bb3
File Path: C:\Windows\System32\PerceptionDevice.dll
MD5: 4965530aa25344a04d3d90d4a24a91a0
SHA1: 20bfd2759f368bc19f587fb29dd1fe02bcf94a49
SHA256:edda2d5f7060b13cc2490b7eab5a88e1f2893616133d2ff9085e9eb4bba33367
File Path: C:\Windows\System32\PerceptionSimulation.ProxyStubs.dll
MD5: ed10ce7b2be54fd4a1ca775deff652ae
SHA1: 33533aa820189c4604b342cbd5954f6cd419615d
SHA256:3a8188ba9d9b396c001fe41a6fa05acb018b9e2ba9fec30679411066a6b95c35
File Path: C:\Windows\System32\PerceptionSimulationExtensions.dll
MD5: 8e490ff0100865bd55e50c4fd801103c
SHA1: 6afc50738e5d91e313d0a487f0694f0d164c81db
SHA256:b19c73f91abc61a87cb5eb3fdf0c21e3e639650fb1da04680312d14bca76a5bc
File Path: C:\Windows\System32\DriverStore\FileRepository\perceptionsimulationheadset.inf_amd64_e7042aa4fa59db57\PerceptionSimulationHeadset.dll
MD5: 8fadd9d6e0775b16c7ed6ae4a2aa0b41
SHA1: 0499431c44ffabf7b7dbb24f549280699ea41f4c
SHA256:41290ab8d36fb4eead7e7f45a2c8d8eecb2dffe47d562400d6344fc3ffb455aa
File Path: C:\Windows\System32\PerceptionSimulation\PerceptionSimulationInput.dll
MD5: a05f3383ae0cacde9d83c58876884f0b
SHA1: fda2acad6dbc8352d0cf9dbfa69b7395452232f4
SHA256:b6c0a255d51f6c72212617b44f7de2c9efb487f54429fdc23bb65018ada5640f
File Path: C:\Windows\System32\PerceptionSimulation\PerceptionSimulationInput.exe
MD5: 1ffb702725efb4e4094edc9d30fd2c4a
SHA1: 7eba3a9dd1d255fc2e102c882c04d62684220a26
SHA256:b4e2a9ca53e233ae09295b2472de2c00cf08016861bf404e7cd8199f59333b19
File Path: C:\Windows\System32\PerceptionSimulationManager.dll
MD5: 6db24d295bf7bb57e3ed3ba0921f7a56
SHA1: 0ccb646a01c68e2c78eddd3d748ce0599a94e8d7
SHA256:42f59e05c992abb3546608ac68f938f928c1ddf725c5ba8d3084deb483d0ce4c
File Path: C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exe
MD5: 9ce51464d93916fc207113b3d030ebdf
SHA1: eb32ddb1543fb744547527263d68f4553efa97df
SHA256:668c5dfe5350da33ef3b2fe8c75ace41b0b79a21d62f0542e3b60b71c85a9e28
File Path: C:\Windows\System32\DriverStore\FileRepository\perceptionsimulationsixdof.inf_amd64_3ff016f4df6d2b8a\PerceptionSimulationSixDof.dll
MD5: 3852893aa21f7bb7d0c381ef9b2c2a53
SHA1: b93707ead45caac078962d8fa0d68d3f2d1e0c83
SHA256:48cf4723f03847e7c04b3644a4f2ed1197110f89fea3d98f99c192612da80489
File Path: C:\Windows\System32\PersonalizationCSP.dll
MD5: 122a2eb79fc1a64efcd8095549d0bb78
SHA1: 39fce13e308ff2265811c1126f19e79e0061d2cd
SHA256:82614cb7d20f02a4341ed02824ef2a008859d69a87dabe612b9a39cbb390f440
File Path: C:\Windows\System32\PhoneCallHistoryApis.dll
MD5: 81e36608d051f227e19c92c8ba1ec9f5
SHA1: d6bd27976f1d3664c04b3f414efe1d4018a5537e
SHA256:8ee8bd6353868a1da4b782520edf59185636b10143817d062b34c0348b5c4626
File Path: C:\Windows\System32\PhoneOm.dll
MD5: 2c5422c70fc601f404e8160a9b956aab
SHA1: 21bd0b71bdf9c5cf2d46c5c9f66edfde7742f8a6
SHA256:0553f3257c664ef268385e2dbb069a23b4ac8357460e52f3fc8a71c01c8bc7b8
File Path: C:\Windows\System32\PhonePlatformAbstraction.dll
MD5: 53ebacae7b7a661cea6ae4c6165e6029
SHA1: 7d3180c9b1771998b6cfaca9d8a9771086bd10ab
SHA256:4544f876766945752fb61b3a8dae30332cd31a092f81c669e3876aeb6161ed03
File Path: C:\Windows\System32\PhoneProviders.dll
MD5: 2122d92b407ce0a135e5f4813430bef6
SHA1: ebffbd2e4a2c87c9e6690c60691eb6111cbbba49
SHA256:6c46243aefe0b43bd2f99e1098f7f7f683d8814609d5054d05a2ffc6b594f42e
File Path: C:\Windows\System32\PhoneService.dll
MD5: 819af2380c64b533488ef9e703bcd0e8
SHA1: ff75e54f1fc4548766987fb71b20c3b204c70aaf
SHA256:3682d6c8a607c5ef22823d38ab30e9d036c83402b1c32db2391ca467740356aa
File Path: C:\Windows\System32\PhoneServiceRes.dll
MD5: 407816d53a2435050099089754b82cd1
SHA1: e275d98e23968295b93734870016fb5cab3ab724
SHA256:ad4658dced1596e4bf58582d70b80bdd4a1174d207873f3bed64f83c740b857f
File Path: C:\Windows\System32\Phoneutil.dll
MD5: ff14bb514ce527022dfdd3772b3004ce
SHA1: b9d4044bd68c50668e04c92bd7534144aee133b9
SHA256:f6398a82ae95e0b9fff8202b041d89427a54b60b735ef2cbb1e03716d5d1f960
File Path: C:\Windows\System32\PhoneutilRes.dll
MD5: 357441a9ff5db367551b5e856a9cd09a
SHA1: ace6145456c8789f31ecafdbafd104cba0d64ec8
SHA256:f4420763c56612be947935b9984c45496eef19921db6aa898cd4939308f17bf2
File Path: C:\Windows\System32\PhotoMetadataHandler.dll
MD5: e1a0ed096a9b2d8f4c10a572935521ef
SHA1: df9615808811e5e1c4ecf53271dbf68d1dc1e864
SHA256:f8c151e0c047ca72dcd63aa886b3839f448e0121a7b20e68d32de434be3195a6
File Path: C:\Windows\System32\PickerHost.exe
MD5: b34042a32f64c2e3b35ef899ad0edb00
SHA1: d5f67ad1bacca16a6aede62ac5fa789005f630a8
SHA256:5831e5d964e09caac2bf99b76d5c151e9acd57695d442d6e9443c6dd54581564
File Path: C:\Windows\System32\PickerPlatform.dll
MD5: 664b960fa5de21543b862108fffb9c60
SHA1: d3553aa88503a7069c2a7adbec908c84fb02dac9
SHA256:a42baa170818ff699dbd6a61ce920518383b45c8353396b10215e7f0498608a0
File Path: C:\Windows\System32\PimIndexMaintenance.dll
MD5: 4d193958b82a0ca71891ac45d46cfc5f
SHA1: b18e71bf6d85a10d2bfa7113c6e171c136656479
SHA256:09ae8cfa33cec4eef6b9bf464ed4c8999d78bf14c930d0fa91cdaf79321130cb
File Path: C:\Windows\System32\PimIndexMaintenanceClient.dll
MD5: e407d763ea91beabd6bf15c4598604ef
SHA1: 8f20e958e0ed29f7065b95423d33ea64ddd04732
SHA256:c77b3310c639b15556a74be9e6a4087c86c03f0788cd35bdd3a71f162c90f4b6
File Path: C:\Windows\System32\Pimstore.dll
MD5: 4e419a02aaf6e1709eb7f7ec66cce022
SHA1: 17607be4c24944ffe51af2b0625e6cc0916e27c2
SHA256:557a4b87b6d5e631786bb268cfdb2c727bf3f1523016daa80b5c23169aeae450
File Path: C:\Windows\System32\PinEnrollmentBroker.exe
MD5: 92f1a149a55758ef4d8fd0439f92bbc7
SHA1: d5a1af485c8eec21ed6f0199c22219c9628e1458
SHA256:a5b9c176cd734de2fcb68c23abf21bb88985e3ebd9fee45e27df5d206f90f182
File Path: C:\Windows\System32\PinEnrollmentHelper.dll
MD5: e9739f8078db6811d8e5b54d3422e0cd
SHA1: 64800a9f17a758b8bb0f94852872644001df6755
SHA256:2a575397829921aca1f38100b1299c906a555d8a1525e97871dc2a65bd3091c3
File Path: C:\Windows\System32\PkgMgr.exe
MD5: c56c10d75617df912fe62ccde6d28fdd
SHA1: 77a81e496eaa67c1d5f09430dc7d20ca019cb00c
SHA256:f8e770086ef057c359b17af5098c2ae7205a6f49762f34050f52f03e8e98329b
File Path: C:\Windows\System32\PktMon.exe
MD5: 5983a81dc4e80594fc48a3e67b71656a
SHA1: 78f6e892e22935446f0680d0d8a3fc0645108c48
SHA256:fd4c11b2975d03590a6190bb2e0e837062da48ebaab4742fe73c10ab322c9bcf
File Path: C:\Windows\System32\PktMonApi.dll
MD5: 7d39c6d53e49d8955246dce9089ffa20
SHA1: 208d99160c754fc44481185724f7cf4f6f8a8977
SHA256:f01e3e4848230eff742dd48126705f42b7b3c9f78abe12f11c994add32215f51
File Path: C:\Windows\System32\PlaySndSrv.dll
MD5: 881a60500c2addf89224756fca33cc5a
SHA1: 291f2096f5521a880731bb80f3ce226f11a9629e
SHA256:c77aedce822a9e355a77391663ed6c4df2eab69bb05a408b92b74f1a565d0524
File Path: C:\Windows\System32\PlayToDevice.dll
MD5: 249af38630ca4c7c34c1a4cca2c46426
SHA1: d12a6682ab112df52b7323348988a60beec4e6a9
SHA256:5f3ef82fcea4eaa109defcd28763806daad43989bd9a76c5e798dbfb388cae3e
File Path: C:\Windows\System32\PlayToManager.dll
MD5: 71652451c49071e759a4ece12abdb397
SHA1: 19fa490de77b373a9b7f680eede6c47f907c6142
SHA256:092b2e073077ec19f0b9adabd5eade945e3ef56cdf6652805ddd0ecce8ea79b5
File Path: C:\Windows\System32\PlayToReceiver.dll
MD5: d91d7b211b5a330edf73157708adb993
SHA1: 724991bb690b77d19a49698d04d0f8db8bf04603
SHA256:e0cf074dd6c6523a1f39d7a0855fd98fbc27b93f8749cc45683584e892c86122
File Path: C:\Windows\System32\PlayToStatusProvider.dll
MD5: 9e87d3b3627785559bbe6f53fb21c550
SHA1: 561a8071c6ae62e6df62f2f8256c8273bdeda0da
SHA256:e246946a27bb388607cf4bd3cc85e86a687ef3e36ecc89b1c49b49d74e74edf1
File Path: C:\Windows\System32\PnPUnattend.exe
MD5: 57348ac45b263e5fa891fdaff3e7fcda
SHA1: a8b49a3d1fc4114c27859e1af3597b4b3d07dc51
SHA256:046b571d3396640f6375a63f546d959d8671cc95c89ebcc61a12176d733350b7
File Path: C:\Windows\System32\Pnrphc.dll
MD5: e2d4ae7c63b317902eda42f6e5726f70
SHA1: dda6d996a30b62c1b31088d2d17d329b79fd57fb
SHA256:cd66b17857cf92adcee7021dc3694984ca771a3314d961241569a7e23e9f08cd
File Path: C:\Windows\System32\wbem\PolicMan.dll
MD5: 97ca2ffa68ad492014edb2d199cb2e3c
SHA1: 13f064a37aee9cf05648d064a5cb4c53a82923e7
SHA256:9075097c3578d6bf9ec8be266d192a3e4f8857ee6dc57b07f8af03cc1f10ad71
File Path: C:\Windows\System32\PortableDeviceApi.dll
MD5: 9677a2a585d64b929a46594840b7f7b6
SHA1: bf6807545f04744503030fc70b33ed5b82a556af
SHA256:5b19ffd88dc6658ae5f243b51dd9fd3b8cc5bf15fb92f53f08dd502183f4f369
File Path: C:\Windows\System32\PortableDeviceClassExtension.dll
MD5: be26ddbb6ed6a278025664e417afb289
SHA1: 8a69e1cbfadc7d2e57c23589e4b8edab85e19789
SHA256:518cde970dfb3846b4aae5244adda8b178ec746e9e96a4e0cdbe1c5c8307a85e
File Path: C:\Windows\System32\PortableDeviceConnectApi.dll
MD5: 7c812498ebdd5aa9abd2cd45a1f1d106
SHA1: d56af122cdb0d2e0f01c89013d03df3cff8489ac
SHA256:402b322e2c29df0ad0074875b32dee1af1d1e9275d97dacf4305ca09ee9e8566
File Path: C:\Windows\System32\PortableDeviceStatus.dll
MD5: b1570c8cf6cb5f962de2f9b940d3dc1e
SHA1: 028c984661855909c979ae49c04bae35a9ccbda6
SHA256:e6557811c5b3ac2bdf53b3b44db0daeb2b194ba6d7d9c9b3df86fe29671ec4e4
File Path: C:\Windows\System32\PortableDeviceSyncProvider.dll
MD5: 2700b22937603c6e1f331c1c64bed1c6
SHA1: 8eceae30a4cc70bceca6053f63d1812614039d29
SHA256:69a2eaa349cba57229f97778a96ceac23b9a04cc8c272422ea1376a6259317b2
File Path: C:\Windows\System32\PortableDeviceTypes.dll
MD5: 1e3e67a48b440dcbec3d19200e33049f
SHA1: 4e14ff02c14dc6c5bae66d342a7fe8313ce97b5b
SHA256:9f7c6c1792f43840495e0c3260110bd012ce065207a27c07b7e3e6fdf013fe76
File Path: C:\Windows\System32\PortableDeviceWiaCompat.dll
MD5: 61029aac458a11a012af65f254538ac9
SHA1: 06458146c60d1995046871379a3d9861adc1b1a5
SHA256:f8971064c7c0cec34a2b1bb61d4777f49abeee704f0898e2cedbbc0faeacf817
File Path: C:\Windows\System32\drivers\UMDF\PosCx.dll
MD5: 1a9664ddb20ca1312d1994d69eaa7b53
SHA1: 2310002b634d91594d152f96af904525dbb81d09
SHA256:fd4b5641bc2be9236205238ea8625b0fb613b3d505f58205cf0a8a24eb360957
File Path: C:\Windows\System32\PresentationCFFRasterizerNative_v0300.dll
MD5: 8ce8f5996e0a68916121f714d9e1a434
SHA1: 8b69c123ff9e4fe04fe729b5d110d97d314d234c
SHA256:6f2dc96ce7b4d51b94537ae0583b0d8a591dcebdb18132a362bb7640437dba10
File Path: C:\Windows\System32\PresentationHost.exe
MD5: ef27d65b92d89e8175e6751a57ed9d93
SHA1: 7279b58e711b459434f047e9098f9131391c3778
SHA256:17d6dcfaced6873a4ac0361ff14f48313f270ac9c465e9f02b5c12b5a5274c48
File Path: C:\Windows\System32\PresentationHostProxy.dll
MD5: 5b88ad421b41823316d1dba03105a433
SHA1: b497b1a8da057417d510d4c19554e244e264b9f6
SHA256:83f88c97ce20e222cebc04a0dd9f87b88a13a015c1616fea2f49e3c03f24d6b5
File Path: C:\Windows\System32\PresentationNative_v0300.dll
MD5: 92af6c17717c368578723ff273b6beaf
SHA1: c5a21d9f243a08576d3882f7e1cc3d7b3565e8a1
SHA256:2aa0255ff083da3fb406a9ca53549f6785d8fde7eca917eeaad06af96959c01a
File Path: C:\Windows\System32\PresentationSettings.exe
MD5: 47e6fe3dd9b108c95ab49d21e43534a5
SHA1: 04c88e51e37c8f80cd5128fdb55a77b5cdff89cb
SHA256:bcdce43f98045d0d162dcdfde0d33d717792bd738489cf67752289b1692e052f
File Path: C:\Windows\System32\Print.PrintSupport.Source.dll
MD5: fb1b8c3f918857fa235dcf5979b2ac14
SHA1: bd3efefcba91c7b5dd6d7621d2671a66a026f2df
SHA256:2dbfdc6e259ebc9885ba599e3574b16f96b55dc9a8988a0d69993e8d58ffaa0a
File Path: C:\Windows\System32\Print.Workflow.Source.dll
MD5: fa70c5138e11c16e1406ebeba6018689
SHA1: e9ee0f2cc6142faf0464e6a8d4272e99872ec7b5
SHA256:ef2a4f51984af32aaef703a25698771a682e88452d50c60d316eeb5791a2a748
File Path: C:\Windows\System32\spool\tools\PrintBrm.exe
MD5: 2f13960077730aea9906bcf0b1a661ef
SHA1: 803a63cbec7495fd352901c147ee37aa2fd9c0a7
SHA256:5b0024c00dd8729e29c70adb8b9c3e54d53dc4847f074a19f7f985fa96d596a2
File Path: C:\Windows\System32\spool\tools\PrintBrmEngine.exe
MD5: 4b500a4a4cee31fe7dfd2d404ec55d8a
SHA1: 73b0ba5687e724f612bf3a8e447627b5cd6fe4d3
SHA256:b9ac13d0ebd1d48fa4e0acef488b943f7211c5fe2efe8ad5139421b09b280b7f
File Path: C:\Windows\System32\spool\tools\PrintBrmPs.dll
MD5: da3e37bcb7166cbc6f019489e7c3cef1
SHA1: 01b48c812e180775e541f2def8d196740d5ebc1f
SHA256:2edcedd9c78bc001265a19015fa0dfb5f0f4632f9c9f1667a39595fa332681e6
File Path: C:\Windows\System32\PrintBrmUi.exe
MD5: d937ee5cb2a07eaa0fc51001babae1bb
SHA1: 8d0f7d5d44f4dc792b3aa739ef428785b01975d0
SHA256:e20c1a55e8520727fdfd9ef8ba36150827560706e2a89ce63282d01ee059dc48
File Path: C:\Windows\System32\DriverStore\FileRepository\prnms003.inf_amd64_56e3bb563920555c\Amd64\PrintConfig.dll
MD5: 595325838cde7cd99ec14c99ccace7e8
SHA1: e3e1f584e3f7cb2cb8eee71414ad19c2e079e68d
SHA256:c2b3bf203ff6bd55cea91313717e58fbfea728c784545effbcb5b897b7096966
File Path: C:\Windows\System32\DriverStore\FileRepository\prnms003.inf_x86_b8cc7bb75e1c5f46\I386\PrintConfig.dll
MD5: a33b03c22e31d29e63a3b60a17a9a13a
SHA1: 9cecbe73bd434af28ed4e9a3dc6f947d9478f416
SHA256:f7a04aaf8a5c49f83f299875d4862349bb46865bdda7ee8699eb7a7ecdbc1d59
File Path: C:\Windows\System32\spool\drivers\x64\{07AACD19-9F7E-4816-A881-97364101701F}\PrintConfig.dll
MD5: ba872272d6320d207e1ae65dd4b4450d
SHA1: 9e3f2e02fbb346a2d80388796279bb28b6c4ccad
SHA256:1b7ecb2997846d1225744a6cd55f5267a530ed136e9273609e2d321d6e4c0498
File Path: C:\Windows\System32\spool\drivers\x64\{23D1F4AB-4A11-4C34-8931-73F5B8470F61}\PrintConfig.dll
MD5: 1fb1fb23a60c75086df6a30ca664fd60
SHA1: ff58860ca4422fed54f30f1b6bf4e0937f772539
SHA256:92a5b954f2761a3fc5b6060dc31c17bc17484a6897ab86aa4dfa3d3392101d42
File Path: C:\Windows\System32\spool\drivers\x64\{3116925C-65FF-48A2-9667-E3DDF0328E40}\PrintConfig.dll
MD5: 653810b9529845ec1d0ea391eeffcdf3
SHA1: 83867bd81a53758b25ef3b71be08499fbf6d674d
SHA256:b533d8ebd8b688fec6afd1bb0f462250911f88373b41019083893eb98fcd3f8d
File Path: C:\Windows\System32\spool\drivers\x64\{3F1088CC-C78C-49F3-BD6F-223A5B34EAD2}\PrintConfig.dll
MD5: 207791c6cf332c53c72bb2e66ab13c6e
SHA1: ff42c306a65f707e053d47cfd48c1dad6456c82a
SHA256:1f067d862ece38294b8acdfec0f50a82f1e4b1b5a6acdb7a8f5ec6d0b7d9c3a5
File Path: C:\Windows\System32\spool\drivers\x64\{47514AC3-9520-4C4D-A437-E7A7D7006AFB}\PrintConfig.dll
MD5: e4ab751d0504bc87e35f07f68a44e931
SHA1: 0740af92f457ec7049da6e02ed43def688da9993
SHA256:f5de0a654858fa29c0d6826f072243babd20f8fac68350ff5f681e947668e16d
File Path: C:\Windows\System32\spool\drivers\x64\{59BF520E-694F-4F61-96D2-B1D7E4F0CF0F}\PrintConfig.dll
MD5: 635fbc9956061001f16d22187860003c
SHA1: 5ea482637ab9b8196da264476a6a889402f2cdcb
SHA256:830bda5bbbdd45656839ada70870157f2d6e50ed142fd6dee75795a109982f45
File Path: C:\Windows\System32\spool\drivers\x64\{60D8D5F9-25E7-4700-A632-6BABBA46AE09}\PrintConfig.dll
MD5: 3e01a926d68286ce8173e3f1a8ea59dc
SHA1: 0399966b6030dde402a762262ddb24819e5d181b
SHA256:030c18c1c694008133d9121668e43a727f80b1d95a6d5fb82128425b84f6cdd1
File Path: C:\Windows\System32\spool\drivers\x64\{816DDEBF-6A5A-47D7-86B6-D946FCD145FF}\PrintConfig.dll
MD5: 7258058a1c0d2b9250a2ae8385ecce57
SHA1: d1cfb9637284f8e0db159700ac11f7ed359acc76
SHA256:323bea4786710185624740067e188360368644a245bbe32cfcda40c636a6c736
File Path: C:\Windows\System32\spool\drivers\x64\{A760885A-7EA7-4D37-8E13-3D0AA583795E}\PrintConfig.dll
MD5: 70f883d61f5660eef2534871d10609d2
SHA1: 2b3fcb8d718a60f8b4df2640991f31c60548f331
SHA256:e7d6a07d471b7615236ddf65e1c432d72cbd696eeafd20d713956f1252a3b4d5
File Path: C:\Windows\System32\spool\drivers\x64\{B6D150FC-8EAE-42A9-8580-DB1B62B29035}\PrintConfig.dll
MD5: 3e1ff6f21ad1c857280ef0cfebdee0dc
SHA1: 0b911536940256d2c4ea9d810e55492b849b0ac8
SHA256:4cd80d6d01a2a4caac3e6cd2a776c3dfaa5c12535aff4b3ce178f09cf810ac33
File Path: C:\Windows\System32\spool\drivers\x64\{BCCA5BAF-8BA4-4D37-A32D-0C0AF759F407}\PrintConfig.dll
MD5: 8cb8e390b70bf8153091ddb583ee2f5b
SHA1: b2756ff08ad263b0274f9397153acdad4a46053a
SHA256:e54b7a113fa63c1251b62336987a2e97657e8e102d22e3f45f1dc3b18efed896
File Path: C:\Windows\System32\spool\drivers\x64\{C08A92F6-ACA5-4F5C-97F7-00417E77AAC1}\PrintConfig.dll
MD5: f833ad1fb0e1d21f1232c555280f18ef
SHA1: af74e8391adae7edf8f824c0fea28600e56876dc
SHA256:1805bf76a9a373b0c17c4840964bfb0c443c7a54d231ece9b7bdac0f45cb3f3e
File Path: C:\Windows\System32\spool\drivers\x64\{C756C5FA-AB8C-4255-A6F3-4D5A82957954}\PrintConfig.dll
MD5: db6af2064701fa70f3c7bb21fa2df5b2
SHA1: e37f22c5f1ce74da9fb9ea7f41b4e4f928f842cf
SHA256:41a0dd7932f1c6afbd55b5d15ca46fda45a8739abf3605c0c73b75149d4bd8e8
File Path: C:\Windows\System32\spool\drivers\x64\{D2A24931-BE10-4659-AAAF-9C117FCE7FE1}\PrintConfig.dll
MD5: e3030bb511cb5ed992836fcbcb07acca
SHA1: 9188052f2bf507f73b8c9a3e7a0b6afd523f09a4
SHA256:c8425673d7b8e000e1b443104dfcbb8892fa2e962cb78963a40f749f0150c991
File Path: C:\Windows\System32\spool\drivers\x64\{DE223088-768C-4886-BE16-EB6933AB082D}\PrintConfig.dll
MD5: dd0bc42d533590621175f9cd76f2cbbb
SHA1: f678909042486d3a85e48e87d987c06721c94192
SHA256:bc159b12dd4b7172d1cbe0fc452891749c7a151b9ef18d1052e0de5afed45636
File Path: C:\Windows\System32\spool\drivers\x64\{DF10F576-4253-42BB-9E95-3A7F11F364A0}\PrintConfig.dll
MD5: 98b021ec186408de7cd48ff1806881f0
SHA1: c595f70fb45013feb1463ab3b7f9f1d71d8b1336
SHA256:4cad07d4241eb02277500cb1a72151844566dbf69b5ebae29f840d255fbab1d7
File Path: C:\Windows\System32\spool\drivers\x64\{E603B22B-4136-49C6-8137-61BA9D43400A}\PrintConfig.dll
MD5: f6630502a0df0a3a2e007d0cd0a39160
SHA1: 725d9920380df9b7c156b11bc0fa09eeb9bbe959
SHA256:ada770c848e2f6813dcd6d87e4173248173512e406da252d5a7cb3a805bf419c
File Path: C:\Windows\System32\spool\drivers\x64\{EEB4FB45-1998-468A-9E2F-EC17F0E6FE8D}\PrintConfig.dll
MD5: 98220082f25ffe099f3fd8c2f4172842
SHA1: 0d21c2e103dce999fadc4cf39840a89253beda87
SHA256:aa5be8e67b0919e4156be1115a435a3bb86ce28f951d05583b4538d83612c4e5
File Path: C:\Windows\System32\PrintIsolationHost.exe
MD5: 04febb66c57f151c25c08a56f72b9739
SHA1: 07bcdc8a25ab0721dd0036b0071d555589f783b8
SHA256:e6d677250c195d9c6df746e3943efcd40c2c37efc9cbb601ee3ca8ea21e960f8
File Path: C:\Windows\System32\PrintIsolationProxy.dll
MD5: 0e29cbed2efce06b0601eb63883d3317
SHA1: 36fa64a20dd26f9bd683db5d6edf40da3d4ba431
SHA256:9234357117e1338bf6decf2b915f2978358b9240450aa2debe4cc484540144ad
File Path: C:\Windows\System32\wbem\PrintManagementProvider.dll
MD5: 9926b997ab1dbc127d5421f0a1a98d93
SHA1: 029bc32937a4c115049b13430dd33f388eecaa86
SHA256:b647fa9a642b680934a586200cea8e7693986b3a6c0e027b67e40c306c94b034
File Path: C:\Windows\System32\PrintPlatformConfig.dll
MD5: 9480f3177da37493df3e49f22db540b4
SHA1: ed629d4fd7108c5f7295c1481af1339f1b452c39
SHA256:72dbac028ac77d64428b74310e623d0d1ce659a3faac5200ee5514bd6ceffaad
File Path: C:\Windows\System32\PrintRenderAPIHost.DLL
MD5: b8665eebaa7b0a7213e9e5444a109fc6
SHA1: f11e3a4de5e943b52ed15475d475bd50a5c58d18
SHA256:6e77585be8fc373ae016edc0f71bdcc57d2ed2d79046c0645d85be93e6bf47b7
File Path: C:\Windows\System32\PrintWSDAHost.dll
MD5: d5563b51bedbfbf8edd108844a71c30c
SHA1: b376b86fb1f77a0ac543f35a773139cfa8acf662
SHA256:6a5421ea37c233555b46e028b50a4f3a3e868a8df938946a28abd362db7275a9
File Path: C:\Windows\System32\PrintWorkflowService.dll
MD5: 95928f6298c01f9e7492f76042435975
SHA1: d34369118599852c4f1660cc1095778da03c5452
SHA256:df7d31192af90f0e58a8d630038746fc9df37c1090e2f9e7f5f6d254304f8270
File Path: C:\Windows\System32\PrinterCleanupTask.dll
MD5: 1ddbcfbdfccfa93c596f4cdc77e6374a
SHA1: eb014b1950fef536aeb84d5b06b753d9e74e63f7
SHA256:a885cf6fd58dedf8690e774fdcdf8ac4e473ea09768d59fd0b63454a09089779
File Path: C:\Windows\System32\PointOfService\ProtocolProviders\PrinterProtocolProvider.dll
MD5: 7c8f3db275fcb0effe21b81743e8907e
SHA1: 63844a2d638247245c61a40d74457b6423e88e7a
SHA256:215ea0e9f89d90947cc0056d3c050be1bd1b783e8fa7dffac06e024b061bfde7
File Path: C:\Windows\System32\ProductEnumerator.dll
MD5: 15d12c301ba04bdc295189d2af0721a3
SHA1: 837f468fa84e8bfcf3ce5485e3f01496098a1e29
SHA256:27b5b246a4304ea2c42b5fe6c9e693c83463a2d5fefad40494831db783d3e093
File Path: C:\Windows\System32\ProjectedFSLib.dll
MD5: 1961351102ffb4c197c4ad67d0efc87e
SHA1: 5b6adc3267a4481213ae0648ace43112bd671e4f
SHA256:c42a2dca67ea781d920ea31c25cc450059bfff54f9c1c99b3b5444d2896e591d
File Path: C:\Windows\System32\ProvPluginEng.dll
MD5: 66c21b967ccd424e381bf7e9680857db
SHA1: 2031333f69924404fa2f50b9ac8923739caf9c62
SHA256:c1e76091f170ca6ddb568faf97f6d8b8cb26d0e09e978fa271656a0e8e305f43
File Path: C:\Windows\System32\Dism\ProvProvider.dll
MD5: 5d7572a7a3724966cf940465ac6e4fbe
SHA1: cab0fdc627744e0f3d99dcc1ca8e8c1b9309301a
SHA256:2d3af1a4c4733d01c46ab82cb7e8ff0392db91db207ca9437a956c9bc5e2186a
File Path: C:\Windows\System32\ProvSysprep.dll
MD5: 4657224867620c17e86a4480bd423dd9
SHA1: 86ed1d1aa517b13a1e29a804b08e8d412cd73764
SHA256:762a13610fa23ce8973e1bc4c3a6be2c39374b3f998f695a9af4468089a30c42
File Path: C:\Windows\System32\ProvisioningHandlers.dll
MD5: 5e07c889c52cf77351fe284df7b8c1df
SHA1: 9d629242cbf90698f769c36332e083e816c8d202
SHA256:7488b28db2aa7043a3010d1bbb74d70ff32d23b918038dc943e840daca13fec9
File Path: C:\Windows\System32\ProximityCommon.dll
MD5: cb742e1bdd7a7286fc9e0416bc781cb2
SHA1: 40e408070a48389eb4d45e785709c019c0acf5e2
SHA256:d9f5be11221ae647c09819ac501a95192732af8bc814357dcc058b6005d2494d
File Path: C:\Windows\System32\ProximityCommonPal.dll
MD5: 90fc033b6b9485d1c6099fa212ddd82b
SHA1: 6255dc2916646e03c274483c1d05f401b59d08d3
SHA256:072b2326e065e7e16a498bdf6a99fcadf7faaf7a47fb7de857b1ae09827fde1f
File Path: C:\Windows\System32\ProximityRtapiPal.dll
MD5: c064b361cf10294e8f17927b2ee9d6b8
SHA1: cdff64c481258804ba80b86c83f1b3540b858b3c
SHA256:9e00676c7d9db3a021404d448fe52406fdf190bdc8fdf36acd88b7cfc21ac9a0
File Path: C:\Windows\System32\ProximityService.dll
MD5: f1fda64c5f3f34f558e58b8a9c20d96f
SHA1: b7a3cd56d027e9982c458c5412bcbb424b89c8cc
SHA256:5d7ee27ed6ef1c12594d4b9770352dea61d7d6eeb01041452833313805f7b7f0
File Path: C:\Windows\System32\ProximityServicePal.dll
MD5: 37ee9031ba97d034bcb3dccec4287386
SHA1: dec19866420f8a73d065d8453466c352f1cdc7b8
SHA256:82a6e271be82405babc87af9a81a71b53f86098515b50283d2ba0e0b0849e865
File Path: C:\Windows\System32\ProximityUxHost.exe
MD5: bf904e4772de1c28265b4b06cbc592ba
SHA1: 6aad8c25213d8c1dc04038cc49991b787ee83ec5
SHA256:909acfb554deb68119e2a8725c59caf3df6ce1f18a68fe7c39938cdbb6cdfa91
File Path: C:\Windows\System32\PsmServiceExtHost.dll
MD5: c9b1997d7f05e1fbd9253212c6b6d4d3
SHA1: aec4d16a84488fadd3a7f1ba52d1aa5ff6a2b1cc
SHA256:900dbbb79bb6269bb5b95b2c37ae33b4bca8fb695a173e0bdb6c5cab129d903e
File Path: C:\Windows\System32\PushToInstall.dll
MD5: 47d4e611f7ec3c22ac65c5c29fac699b
SHA1: 95dd5fa5aa9a27cbcf3fd799c91f09138a1a0edb
SHA256:27bac3e313ba579e540e2ed29449eaeda14099b47d353e324d27f84823eeae0b
File Path: C:\Windows\System32\QualityUpdateAssistant.dll
MD5: c297f18efe98624e8e868e9d2524cc87
SHA1: 70ddbdb240079b562af5bf66a334d4ce15eb0c4e
SHA256:0bf0921ed9607be103906eb04d8a099b12a0bf95fd3c423ad2b2ba71bb21987b
File Path: C:\Windows\System32\Query.dll
MD5: 5f25b416cb525ed264d170c626fa7d32
SHA1: 6379f7c9bc77b854064184aa8ac6755aef72af71
SHA256:c627ddc66f835bf1b55ccbbb7f838ebb0a20c77e0b0bc05f707438ea9df2469c
File Path: C:\Windows\System32\QuickActionsDataModel.dll
MD5: a03c380eda05e9815fd1d3205a35c6c6
SHA1: 057d92c73027378f0abb4563261fab74a80ef608
SHA256:7e7dc8ca154d17d73d8b25a43d0192033746c34a825e5cd677bfff55267cd514
File Path: C:\Windows\System32\QuietHours.dll
MD5: 572f56ea8bde1aacad66e78d5bdab3d4
SHA1: 6ae9681fd2b3e9189e1c3a0fa8bbd04ada716500
SHA256:e3ef181c7c75f3084cdd56430c41a35d249443b3c05c19ae1dd09c8ba6a0aeac
File Path: C:\Windows\System32\RADCUI.dll
MD5: db56562a2f583f8d71ec8450374057b0
SHA1: ee95a9e5c8ea2e48d33dd33ef977b9c87a435af2
SHA256:d931b0b16ca62678f1d79d63a0da1039571c7de5b9bc08954cf4a31be07d56d0
File Path: C:\Windows\System32\RASMM.dll
MD5: df1dbc0011ddee6ad1662760f34ffdf0
SHA1: c304f3385a9ead2f55b83678e1d3168515203832
SHA256:d3c8043f25004b1eba41d60d845c5f0f87bcd5a3c09bcf0b3b05e8c55988c953
File Path: C:\Windows\System32\DriverStore\FileRepository\rdcameradriver.inf_amd64_fa52d0c0fe17b959\RDCameraDriver.dll
MD5: f021f58fbd8a58b0f95541bb892082bd
SHA1: a244aa65bbf99b074bb597d6b47f6b7c86059fad
SHA256:1750c27786d4f55d0a4d3d80d2522a0b8b7bd490b776f37e310594e1d9521651
File Path: C:\Windows\System32\DriverStore\FileRepository\rdcameradriver.inf_amd64_fa52d0c0fe17b959\RDCameraMediaSource.dll
MD5: ebd7900623274dd4131fe27e79045064
SHA1: 8058998dd26dd1e6e7de552e0b413f03fcfee7f2
SHA256:36ee87654465a61460be6e26031a422479dc77ac6b887ac7e3771889d0ac1aa6
File Path: C:\Windows\System32\RDSAppXHelper.dll
MD5: 2148e89243cfd274e1734f00580ccc6e
SHA1: 04cea00f3296510f366e02f9e62c499c0410f46b
SHA256:69cf726ed2decedc56a3c2f81d474604b6d16002f3cd6617bbe2cc22ec0293d2
File Path: C:\Windows\System32\RDXService.dll
MD5: d4c86067bcd408ae208f756002861fef
SHA1: d8832ea1c265fbf4cf670403fcab9960f496dad6
SHA256:e5af624c6262ed2ae114a39949a2032da3b90ef1c573015713f36c096f56a815
File Path: C:\Windows\System32\RDXTaskFactory.dll
MD5: a39831970f6d0f873934f287fbf3ec6a
SHA1: b4a697a7c9142e8b8af5a2ec5a5091de7231a82a
SHA256:552807d3f36ecc79e2bf8b1c4176fb8706007fc426f047f8430e72185ea87ab4
File Path: C:\Windows\System32\RESAMPLEDMO.DLL
MD5: dafbfa941f1d5af65c296a2b22d0ec7a
SHA1: eaad1642d87dc72247930f93d7800f5e4c12e82c
SHA256:5319c6b57e4dbf9cf23362bce0835a5deae25ff1036ea2766033333db6295f97
File Path: C:\Windows\System32\RMActivate.exe
MD5: 1ada58a8ebabf37f7fec6e3ed21fcb14
SHA1: 6832a72c98bbadb52eb8e15502814d01b5117a3c
SHA256:89d337b562fbf76eaf1b57c329ed920866dc8617570484ec20467b2f67767dce
File Path: C:\Windows\System32\RMActivate_isv.exe
MD5: edf82aa24d1ef5e0330afa32f189c723
SHA1: d05e3a7aebf5d7e0eb498fa6bd947005f031a825
SHA256:76643cde30249cc42ea4d5ed4068b1185ad27b4f660bb8c5308fb52bdb2beffb
File Path: C:\Windows\System32\RMActivate_ssp.exe
MD5: e7ade9067d5eca46d91ca46b2c601b52
SHA1: 5895dc497019cbe618f6144f1d824c0bf32ca01a
SHA256:81f0a5328e54d77a8986a21a2cb64efe94be1fd9b45f7c1b9e2a65eef7768c4e
File Path: C:\Windows\System32\RMActivate_ssp_isv.exe
MD5: 2652297470c8a89ccacb79af2f391003
SHA1: e96b643dc0ef6b2429bf35877bd13d182fce38a3
SHA256:aead49ca461086872d44d6b4c749a961fbfe39a3f6d51a9b46756f854c574356
File Path: C:\Windows\System32\RMSRoamingSecurity.dll
MD5: e5318f1c9456dd26935a5d3fa05b87c1
SHA1: 00d622227cecda6e8dd2568d772ed05b0bf34677
SHA256:89fc3d7387b92af5c605f94e60952d9382bc7ab6ef343e63f069fbf3e6fb7e26
File Path: C:\Windows\System32\RMapi.dll
MD5: 2f9cb5cbb7db76a753a99269a11437ad
SHA1: 74ec70829bf2d61b52056f6217d9cba2d463807e
SHA256:d87bbbff733f951f5e6c0b7c5516c6e22b9ed71e814ca85f115851a1b6738883
File Path: C:\Windows\System32\ROUTE.EXE
MD5: 3c97e63423e527ba8381e81cba00b8cd
SHA1: dc9ecd7e9ff4a4675c977a418bf1bb562c34c890
SHA256:b8a28aeb6345ca88b04ff3d9fadf30eacf26958c991bd8e4fb1df12a68f60eae
File Path: C:\Windows\System32\RTMediaFrame.dll
MD5: dde3d3c734c93bc89fa68d6cabe0752f
SHA1: 1917e05ab1ad653af792dbdb348a72c4863eabcc
SHA256:fe0a0bc7caaa3b539739fec16020fbf74e152336e222508ea9a96196dc5c0e2b
File Path: C:\Windows\System32\RTWorkQ.dll
MD5: b8f4481ce60388a940a8258443fde95d
SHA1: 82fe3589df301e114f97a757dcb24f2360aadcbd
SHA256:2077b695c55b7eccf5c3e4da356383f40ec4077f57651fe92a2ed93eeed99a7e
File Path: C:\Windows\System32\RacEngn.dll
MD5: 9a86c3da2f39f3c6b1a4291f6940f6ea
SHA1: 42e18468193e656b0e782be8023947a7e4c941d1
SHA256:2235f03245ab289919a5c0b2272bf2f3a6a6a1e091944be1dfce79831678a71d
File Path: C:\Windows\System32\wbem\RacWmiProv.dll
MD5: 89f90990e9c565095623177d5e2c42a0
SHA1: 5705e41a23e59a7b39cb91f0887fc6aceb046667
SHA256:1ed7b4eded304ce1fc0ce84a891c3ec24e5714c041228fea5a876e2a3eb6ba65
File Path: C:\Windows\System32\RasMediaManager.dll
MD5: d2162e1bf36192750beb35a43ef28507
SHA1: 62590e797fbdc23413a23e7b1697c95cc79f8c81
SHA256:05326ab5c98943471624fa488a6b7ca1819a54f9743be03511b0ba0b193a02c8
File Path: C:\Windows\System32\migwiz\replacementmanifests\Microsoft-Windows-RasServer-MigPlugin\RasMigPlugin.dll
MD5: 2185b4280b732071e439e86ed0143987
SHA1: baa185034cc21f8828c3608b2284bc797bfb5308
SHA256:b70391a4a43be6e817e7b850ac733f66ce28969f686ef533389004fee0cede28
File Path: C:\Windows\System32\setup\RasMigPlugin.dll
MD5: e0f7ee2e7f44563c2cfc52e2809a37f5
SHA1: 2005400c69ad74f23cc0804a10fa9ce8f6a37722
SHA256:288e9109f8dcd8cc2463de3889d027ea7275f3cc5572ec4bcf5ad65c9a63c40e
File Path: C:\Windows\System32\drivers\UMDF\RdpIdd.dll
MD5: 59b9d13a27c601025267d282266d5b96
SHA1: 2ce106c67b30f744f647d5a0116b7e610e4aaf6f
SHA256:557a787f171167c255397ae65f3d268be13964446501ec3c0fa48673c00fc319
File Path: C:\Windows\System32\RdpRelayTransport.dll
MD5: c32adb9f6787f64320bff20af3dead8e
SHA1: 80b299b0ccfb753d254fbd3a56f83d37937a4161
SHA256:d3d05700600efa4a552a69fe7a9eb6794987bce7dc65ea7919787d91fbd2e956
File Path: C:\Windows\System32\RdpSa.exe
MD5: d6625eaf6545ca928cdceec470920d1a
SHA1: 63613b8b435f37c9156cf3f3e0f0009a0ad54025
SHA256:69ac7dea1330c5d96b5165d22a61b24d5e83616e2f4a34c9a12fb34dd993faf7
File Path: C:\Windows\System32\RdpSaProxy.exe
MD5: 67344f4e394bba5e58cf43d9eb7c8f95
SHA1: 41ae6705e1c7ef3c203f92e809f7f73c530c8155
SHA256:c73158d92c221e4693f6c20f6b5213268f713c47be8133a29d824a9d31c1c109
File Path: C:\Windows\System32\RdpSaPs.dll
MD5: 23c4c2376b0d6ba361800adbb0666fdc
SHA1: 92f457b2d143b7c16acbd9db65d885ef7133844f
SHA256:c844340746818711894b607a8e3adf9c031dc4c2306c1edf1ebb0df8de5e1efc
File Path: C:\Windows\System32\RdpSaUacHelper.exe
MD5: 8a0cab547c7c223ce7b5134ddee08997
SHA1: 79fdded3edf049a02f716a7582aed77ce0fca880
SHA256:b908dc8b0973e818461fdca87508a2d1795c628a6516bb1f8550520298449e52
File Path: C:\Windows\System32\ReAgent.dll
MD5: 8392f2229a5ad5d32b8e0c322b199aa3
SHA1: 9b74e479f216b12a5b614929aca4824ae948ae0f
SHA256:7ebeb8d8a7f097aa486308b74ae899e8651ba300f814b081f94d0639f69647d9
File Path: C:\Windows\System32\ReAgentTask.dll
MD5: d8cdcf032955d54d771c085902ee10cb
SHA1: 31315f877ab0c9110484e9326b52947dd07039fb
SHA256:26b0cb90a8602f909bee44796519e1185801c16b63d61f175e2fdb55907d7b01
File Path: C:\Windows\System32\ReAgentc.exe
MD5: de677551e5b1a13f4fa14f8c906048f7
SHA1: e2c906a021217ed6047958ccbcbfb9592b5485a8
SHA256:e2bf52e6cf659b1ae6eb5b036b0c4b34a795072dbf90be0edb796d90ea0e4fcd
File Path: C:\Windows\System32\ReInfo.dll
MD5: c197942f763fb175a192eb67603d3cdf
SHA1: 0fc814e76aa6cff3b7f2e128311814373f8e56b5
SHA256:2e8e179a76ebcf830d346857353148f4fab29622056ca6d54d857795078e01da
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvCamera\ReShadeFXC32.exe
MD5: 1bbba9b9ec36fcfbe1484c2f39803eaf
SHA1: 85466c1716e718ef7d632e25b5c5859cd51b15c6
SHA256:97cb5dc0e15aa89369cb14c155764d39252b3189b181df4756ae33479fa622f4
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvCamera\ReShadeFXC64.exe
MD5: b9aafbf6858d7b51ca07c8ba6c5c6b33
SHA1: 6075f6814b3ade51b6d6af82fb63f62fb320c304
SHA256:96aed39e0cdc8f1c3625580c927d62200c9da132ca5094fec06839dba67db9e2
File Path: C:\Windows\System32\RecoveryDrive.exe
MD5: 8f4b3285c7cdf97ef04294a2ce855321
SHA1: d2f5e71de96f26a2eafde7386202ec33c8cba0cd
SHA256:7efaa5676fe1fb5a74a8b33f066edf9df6db76504361cc95e428ec07fe515e74
File Path: C:\Windows\System32\RegCtrl.dll
MD5: 71f7d74a8af9a1c9b177c8520b1d2ec7
SHA1: bbf2068f46dc2bee2f7e8b213289daf251a61c65
SHA256:71f7fe19a1205dd9d4a2759d3fa8a2d60c1500bdcb546c44d64beff7879938f2
File Path: C:\Windows\System32\Register-CimProvider.exe
MD5: f9f77eb472f58edebcfea7b51ffc6eea
SHA1: 087b259400c4e523144a4a829610bf589bde125b
SHA256:5311c4b92bda7852580c8df50922f8328eb5a238012f10ded7b38dc3b9d00d8e
File Path: C:\Windows\System32\RelPost.exe
MD5: 903fd767eb4addd4b5c7269c10690407
SHA1: a00be631277a2d452c82bc1b10c2a37c638316e9
SHA256:733fa3cd1877876c1a147f0ef31e95723e88c156d0b881c267220b7b55f39f06
File Path: C:\Windows\System32\RemoteAppLifetimeManager.exe
MD5: 753a67df6c93d4e6698f4a9685a70af4
SHA1: e982ebda3c00913580231bfd8f146654fc4d7710
SHA256:85e905b5c4cfbfbad8055649adf236d9d0cebeee63c36d6829d503d34b9207bd
File Path: C:\Windows\System32\RemoteAppLifetimeManagerProxyStub.dll
MD5: bbdd0cfa22609724363ff4437bb47959
SHA1: 68ecb50c8caa2a7205ccd50b194a43664bfde5ef
SHA256:b1f134a7183435671af8c9c1592d9662c1b4e1788577eb5bffa5b9e8caae148d
File Path: C:\Windows\System32\DriverStore\FileRepository\remoteposdrv.inf_amd64_7ff2bbe159952174\RemotePosDrv.dll
MD5: 2ac22a116342173fc82be9fe93ab8341
SHA1: 9c6b505466d7cd84fb52d636a410cda24e39d33a
SHA256:6b8e5bb1c96c83fffc70e38b50a3a4ea5388c03dab5d5a03a82d2f606e7747f5
File Path: C:\Windows\System32\RemotePosWorker.exe
MD5: 958717b8839c0148b3226cdf343ee8e9
SHA1: a7f5a5a01a5d785fecc1eb6679e4b0a8fe72606d
SHA256:2868b0cc04e8dc5a415daed0fefec08430261fae6b5707a83a848edf8bf24da7
File Path: C:\Windows\System32\RemoteWipeCSP.dll
MD5: 0905d88abb10e3b689a8f701ac3b49fd
SHA1: 23d9533558d9df84b1a0ff033b96469746792bb3
SHA256:e4cb8ab6bbcdce6a2ba1552ad024f4c7bee570b8fc4d12a1bde318b5385d0599
File Path: C:\Windows\System32\RemovableMediaProvisioningPlugin.dll
MD5: 405abe07d7616679f386b0d3fabe6012
SHA1: b9ad76e6d26794d7a204f71af34b824bde3a176f
SHA256:c76ebe79a22852c6d4b8aed2cfadc6f19ca7567271f52a04b42e8ac276c3f764
File Path: C:\Windows\System32\RemoveDeviceContextHandler.dll
MD5: 44caaeb0c09ce2c3d2e73c67c47918f5
SHA1: ac7fb86ae600becfbcb82f8f0f76f2c2d1e03b72
SHA256:5a527e6c030ea5abb27450a44da00446bb53b02d1cda3b1ef662893faf318b0a
File Path: C:\Windows\System32\RemoveDeviceElevated.dll
MD5: d6eba5853fbc0d8f3bdd7e95ec8d74d1
SHA1: ad2f2a9eacc5e401bbfd43d92b4e60095ef17f6a
SHA256:6035ab5db70283c4ec3bae87df46430d13415308f4b671af80c3e310ecbeab77
File Path: C:\Windows\System32\ReportingCSP.dll
MD5: be4a7bde33fdfb4473c7ee798bb8e8f5
SHA1: 1eb70dcd7886aeeec86d41688d71190afef455a7
SHA256:ba8659a6b979bea2a77ece77409c76af0f81957d58e4b6a76ab4913fefcb7a57
File Path: C:\Windows\System32\ResBParser.dll
MD5: 19b5eeec29f044451d5e8e89b1be6f5e
SHA1: 14f2a256e83fe553010812ced63b2826fb927647
SHA256:bf4c9d07d562c66e11576568412352a3ad766fae2ecd227930ff131f610fd0e4
File Path: C:\Windows\System32\ResetEngOnline.dll
MD5: a398442cbafbdf53a4443eeafe8d6f37
SHA1: 72ddf281f9184c04a402825825fc97e6c271fffe
SHA256:a85192f424fb41a54b678c0d7d663d5323f0813e0ebe04943cdbbf4e6a8d4d19
File Path: C:\Windows\System32\ResetEngine.dll
MD5: aa49e80d79898729bbfb8a02c69410ef
SHA1: 73183e4b40b7f5c61aae48db2dac6ee3f9953a20
SHA256:8d70f970a8e644fc83570f62592e8a42987b89f0aa83caa245d0b6e65c30cf59
File Path: C:\Windows\System32\ResetEngine.exe
MD5: 7cf4c0475cfdb0e21d6f81841d2d792b
SHA1: ce56141870abc4ad0327d15c44e083dae49cdc3c
SHA256:8e495b3cfb3b37d751d035fd9218ee6ed4ab6d04be6f3c4af7b86c8ac16a0469
File Path: C:\Windows\System32\InputMethod\SHARED\ResourceDll.dll
MD5: 2b08450d032652ed8a0d93cacfffa5da
SHA1: d8a723cfb3d3b7d5c87dcf3471af98d898101bbe
SHA256:a3b6ec15f1907c62d8d117981cee66be06191e5949b27303fe56a9d2ae4ffb27
File Path: C:\Windows\System32\ResourceMapper.dll
MD5: 9bd3b6755e47c1258a915c790584efed
SHA1: 575c983c6e41971feb719f2eaec8755f34987013
SHA256:a5aefdcd470390a34df4f178fe88d02bc0a5d784ba6efaca1de7ae989df3a950
File Path: C:\Windows\System32\ResourcePolicyClient.dll
MD5: c322327daaededf391e333897c64ab16
SHA1: ba86e15a45457f342e29315fee1832106e594428
SHA256:45916f1576be104da3978ac0c570f1554fd65bc7e4a648dbfbbae8b515a663c1
File Path: C:\Windows\System32\ResourcePolicyServer.dll
MD5: 452e3896ffc260959af22696fd2a7aca
SHA1: bddfaf379bccfe1e96c2b8ada8ee88a937abd463
SHA256:bf8e6b764d6be58e673c8264627243a56f1587e567fcaaca883a0b77e150fb38
File Path: C:\Windows\System32\SystemResetPlatform\RjvClassicApp.dll
MD5: e624a6dfaa881aeb469b7ede3fa0ec87
SHA1: 5f7707e3c41e9220260c19783c104af1570bf6cb
SHA256:f0bdf8184a25e06e916f0b670f0b3d50137e6384bceb89ca0dcb1a45ecadb88e
File Path: C:\Windows\System32\RjvMDMConfig.dll
MD5: 2c1bf4513f7762dce38b2206dc7d7aea
SHA1: bfe3560e60fdf2bc087ebd077b6ab71a0bf0e79a
SHA256:ddb0fdc25e744302f42983c55153433f8a7e18b1e41bb60a9cb814180839122b
File Path: C:\Windows\System32\SystemResetPlatform\RjvPlatform.dll
MD5: 77c3b28f3a66c307a280bf4d3b35537b
SHA1: ccd677328f19f3d268fe9dcae7a99e20b8515263
SHA256:802932a146effd0f26b9760005ec4a1d4f575df9904187187dbcc159853b69e1
File Path: C:\Windows\System32\DriverStore\FileRepository\realtekapo.inf_amd64_a765612dc5334cee\RltkAPOU64.dll
MD5: 55bd26cbfda4bd4a6cd61166371ebc19
SHA1: de3894369db9e7ae3a359b459a7d3b4989c7413f
SHA256:eef35e3034fb98c036b731d82fc99c6bcd602c8b1a0ea12e1c2c6c82f80bff7d
File Path: C:\Windows\System32\RmClient.exe
MD5: 2fbc913d73662559400a314eb1e57ee0
SHA1: 7de1753e8b881f5a7f944f7c19f2180e83823aad
SHA256:d0e19f73e1e3343a995d3da28aaa88bbebc63b871bdacfed664d4f38cb9c62f9
File Path: C:\Windows\System32\RoamingSecurity.dll
MD5: f880ac8d406e82e1c6d3c8d781550063
SHA1: 60db04a58e0e2a526962e53e22d2d6244901b57b
SHA256:b323ff148550697ffe8cf2aff307fbdb4b67ef87a835f7f12ce53138daefa4fd
File Path: C:\Windows\System32\Robocopy.exe
MD5: c5454bf34270851ae3c76015a8ba1ad7
SHA1: 15ea4e86e86ae9c7dec199c2555c8b7a76bcde30
SHA256:cabefb4422e10e9d68d5d5a1298cd5d4f318c22f30f2cf7bb0fda64d2964ec02
File Path: C:\Windows\System32\RotMgr.dll
MD5: 302711b5febf19ad199ea64146bae86e
SHA1: 01afb914d1163ce1686659b4bae2cebcf0ea3cf3
SHA256:e120fe823286fa46e275060a23d9062ab5d7df28979ed1598dd9d2fce9ceed30
File Path: C:\Windows\System32\RpcEpMap.dll
MD5: b4a98296fe082cd5a5f31f484c078b16
SHA1: 2cd83128c4eb8883c9f046037f8a48af2882c3dd
SHA256:cfa42a604807d178f57da21cd8e758b9ff99dc4903509c4ea44342796fcd9a1b
File Path: C:\Windows\System32\RpcNs4.dll
MD5: fe96bd9f00dd06c0cf7c01034d50a9ae
SHA1: 873e56fba4222860000c54da9c06a553f88a605a
SHA256:ada416d1e94295a64f60c9c51a6bd282e7183c93e069fc2121cdbd541ba1dcfb
File Path: C:\Windows\System32\RpcPing.exe
MD5: 106b31549a7dcde1d7a9e52fb73c838c
SHA1: b0cbdf0f2375950f87ab346b043f3ce85009e811
SHA256:b26ca32a7eee65b90658eacaeb3589e69e9efb5686ce6cec7d20c1766da34f32
File Path: C:\Windows\System32\RpcRtRemote.dll
MD5: 7a192812ab53c768606d1184c6f1a121
SHA1: b86b998fefd4327ce003d278e00dff3d75731f8f
SHA256:830e6693c7799d1303e14ae9519644711b0a9fd87eaaceff27ac701c628a4085
File Path: C:\Windows\System32\cAVS\Intel(R) Audio Service\RpcServer.dll
MD5: 591da3fd78fbb56a35b407f23536bb18
SHA1: bca1d8a5befdc5339b2626ace0439daf7bba108a
SHA256:521d045f5116cbb0f5a43669b24c93dac05e20572c1af45a65fc8d06f008d1cf
File Path: C:\Windows\System32\DriverStore\FileRepository\rtlejf.inf_amd64_12d4946cd0679574\RsDMFT64.dll
MD5: 410c58ad18f8a6bd8cd584f87bfce21f
SHA1: e476b1b56aa4d94184997430e934bd0179672ccb
SHA256:99411ede24865df616485738a7460140281aaefeafd6fe57fd52e97447cbe17b
File Path: C:\Windows\System32\DriverStore\FileRepository\rtlejf.inf_amd64_6638ff47298796d1\RsDMFT64.dll
MD5: 012abd55d8ecc399393c201f37c942ec
SHA1: 6a583c42b2fc097f8e37b75223cd3558e3a07861
SHA256:6a901c846ea1e7e2bb4f549ca498cca37a92e63525edd8b5fdd17869da6f1756
File Path: C:\Windows\System32\RsDMFT64.dll
MD5: 49465568b64dd2ed2cc210dd7d8c6923
SHA1: 76a9a77c067424b3a32d3a8269aebdc61b668c39
SHA256:fd750bdfddd42d75bcdd0c1d8c2d03bece060cfdb3241f77f3417526a8d29fbb
File Path: C:\Windows\System32\DriverStore\FileRepository\iaahcic.inf_amd64_724e05bd98458fe4\RstMwEventLogMsg.dll
MD5: f9d6bf016d7eeb81bfd9f6ddbaf17dca
SHA1: 6646856990208160980dc34b07c7d407816c2624
SHA256:77ea879fbbf759a8a95f895a4fd08ff95a1948936b4d05d4c23605ba478d67b3
File Path: C:\Windows\System32\RstMwEventLogMsg.dll
MD5: c7680177d75dea7a675b4109c9d8b450
SHA1: 64ce8e797f927535abf91fab5933aaf312fb8970
SHA256:624e6c79e6682c078c23b88698a782af08f10d789474c40aa7b096e11b921813
File Path: C:\Windows\System32\DriverStore\FileRepository\iaahcic.inf_amd64_724e05bd98458fe4\RstMwService.exe
MD5: 04eb776a152c910cc31172a34247681b
SHA1: d175b8caa0968b9f4652516bab33a7e0a9ebb8e5
SHA256:1da859967e798f97554e216fe36a313ccdc7b8614d3a11256e1447a550ea9961
File Path: C:\Windows\System32\DriverStore\FileRepository\iaahcic.inf_amd64_c98d5e0dfc88ac2f\RstMwService.exe
MD5: 4dcb5bfae9c1887ceec9d19940404c35
SHA1: a95544ba4ef87309d3a55d5c84567a8bf6f15932
SHA256:722b9eadb48b1653091df6602aef5889e7090618b7e1d5a65ade64c2ff28c951
File Path: C:\Windows\System32\RstrtMgr.dll
MD5: b87e2bc0d248af87d05b1c22ff07914c
SHA1: 27d390f5264fa62be0d50fd44df1bd521dba4c2b
SHA256:a714a393a1b13ae300e14ce792467ef45cb55662369181a17c5ad76029a6f038
File Path: C:\Windows\System32\RtCOM64.dll
MD5: 046a1ef9e455bd3f20b994d562f1fcf7
SHA1: 819bab6d52aeb9023b45925945eb4b589aec96e9
SHA256:3684fb9bdb1849496013cb56d63bc52f3da422a23b095545c43c48feed8a537a
File Path: C:\Windows\System32\RtDataProc64.dll
MD5: c0417b333a139a425a115ba208884a6b
SHA1: 6e561d3f3f846dcdf14601b4589f9c14f5947e0d
SHA256:a9b75b4b38b19ef31e74afc7fd730790ec03abc43beb5a46a501140b741c856a
File Path: C:\Windows\System32\RtkApi64U.dll
MD5: 326ca3a72f45a3cfe2fd74228cbdd946
SHA1: aab4517af1319991d198e5f881f51c5be5775136
SHA256:7d8012bc738d62195f970dfbfd35743a3b9e759756a8f70ca83d0e5a477ad576
File Path: C:\Windows\System32\RtkAudUService64.exe
MD5: 61aa8ff8464963ea8fa39a7bfd398b04
SHA1: b01426c5d91610e38f9c83d6183e7e780dcd0b3d
SHA256:f6891b227ca262f020136eacb552f8cf33a044c2d295d2f15e14a50f0ac93a92
File Path: C:\Windows\System32\RtkCfg64.dll
MD5: 1df376911553052092b7d9f492a3fe8a
SHA1: f1781de3bd4458462ce578d74c0d2984527a9e88
SHA256:307fd79717e4b49d67b3690042fe5fd1f4a7fe19ac4cd6c7831ff427d0568c74
File Path: C:\Windows\System32\RuleBasedDS.dll
MD5: 42e8e38c2ff8d43cd3d9cd08e16f20b2
SHA1: 016aaa8dba85e75585e2a353f288f1730ba8b74a
SHA256:0fdbaa820160cb4058bd5b612cab05eb7369af9f7fbc2a6e8eb83cc4a0ed6c26
File Path: C:\Windows\System32\RunLegacyCPLElevated.exe
MD5: 34b45f7eb0b75dccdc7388ce67d2b4e5
SHA1: cc36f12b36f86036a1814be6ee97107e1800b723
SHA256:cf994cfa9c0579a5f5dfac9d6065db1f41b7bee08ff57ffa60e904d75d2c1e44
File Path: C:\Windows\System32\RuntimeBroker.exe
MD5: 864daf03da104a8aa3ba7c2ed5ffddbc
SHA1: 0811c39fd76395ed47646310bf5ecf57a0ac8ce4
SHA256:579dfced8f02a7e1e6e8df10c400117d3127ead7231776a1e467eb507261e920
File Path: C:\Windows\System32\SCardBi.dll
MD5: 3c33986b87c0553decb0b9d605fe83ce
SHA1: 270772d5c4b771abe15b2d930839e795dcd0fe00
SHA256:32d445d3a00408e7b0888a77f1abe81a0abdaa09fe9ffe045460a20c25226e21
File Path: C:\Windows\System32\SCardDlg.dll
MD5: c14ee22b2ac5edb7f68e774ba7799b71
SHA1: f634a4f7ac3d7752ce4c836547bde123f39f71e6
SHA256:b8b9cf623197c11d114e3c0ec761b72894848437f89ee79e220bc4a832bef5da
File Path: C:\Windows\System32\SCardSvr.dll
MD5: fe8c79acee90232308a666627195f55f
SHA1: 94538b82bc4836ac31a03f6e2bda020a4631c64c
SHA256:d0f38e6b22656f226f3b6165809342eb614451727087e3674edff6f4e1e94b63
File Path: C:\Windows\System32\SDDS.dll
MD5: 0c1d91d4fb26f5aae3465061ff669b3f
SHA1: 02eeac216517d3f6d9163c4e4a64f015b11cad84
SHA256:ae6aad45d30e080fe4ed23d9fd5f82becbfec339db89546e0352acd13696b497
File Path: C:\Windows\System32\SDFHost.dll
MD5: 4fb74cc623a7b8ace18623bcb6cc6d2b
SHA1: ac755ff4dfb6f306a50fa0d3c21253c3acd870e0
SHA256:2b777ef741aec554362759caa98dc8822bdec6ee69adde1ede5fbb1989057f4f
File Path: C:\Windows\System32\drivers\UMDF\SDFLauncher.dll
MD5: 2cee9b599ca535cef987eba85a593992
SHA1: ea74e82106722996897fd0465a1694e5cbad1dbe
SHA256:58d5bf4ba24262d6647a23cf27befe0eae39e2dc6f425f27d6033a1cccbc03c6
File Path: C:\Windows\System32\SEMgrPS.dll
MD5: 76e12d39f82567db28b132e245d9e3ce
SHA1: 53cbd54614b8e21e78096d32ddebf0771b359c37
SHA256:5edd09d2a2e2e03ac2fa7db4c7b9f4ee300c696534788dbedaf9cee617a97ab1
File Path: C:\Windows\System32\SEMgrSvc.dll
MD5: f7f0d75eaa30e6a1cbacdf1c8956799f
SHA1: acc56bb1df44894c4a1e0e371741ee2b2a052ad9
SHA256:cd86f67ec056ee7073a8680ffbbdc5cca445942cd8818356d24b9547547c1d31
File Path: C:\Windows\System32\SHCore.dll
MD5: a6b48bd563961dfc86e28f16a2ff565f
SHA1: ca7ba56632427be2c7340008c13b85b841eaf4b5
SHA256:3e9f77910432348b6beff52f2204a934880ea2bbe9ca31c3c585d1332c3b3106
File Path: C:\Windows\System32\SIHClient.exe
MD5: 22cb79ca64906db2482547be6ec8445a
SHA1: 23b567445b100ec679756d036af5647fe0e534e3
SHA256:e9257f62225f5f89c65414ef79b819548f4a234bbcfee41011b63a19cc5ce471
File Path: C:\Windows\System32\SMBHelperClass.dll
MD5: bfc2f366dacf4999eedb3cca05d55ebd
SHA1: 0d6d883e3270adeead06171b62fe78e6b759b0da
SHA256:e7f0ed85df0a780734b629e672423e1b12d3c62c06dca7facdf4b81c53830b13
File Path: C:\Windows\System32\drivers\UMDF\SMCCx.dll
MD5: 4ea8b3893016756737f415016e76a056
SHA1: 5b52e1c5bddfbb7197b149289e5bfb445e7bbd08
SHA256:d3aeb6aeb9d1eb13cf671641d41ef8ab26f07a060a36baec941e753e734d56dc
File Path: C:\Windows\System32\wbem\SMTPCons.dll
MD5: 738a6b297eea9b7ee2f220987b227547
SHA1: 5ddfa8dd0e8ffc3f1e09f5158bd687a1a65b5d20
SHA256:4aed665d87e0b22ac49713d1826482de455af123f759bf6a3108ad0540a5dbdf
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\SPIRVDLL.dll
MD5: 65e6b70fa5c2c0de22b8c05b80990ec6
SHA1: 0799cd773f3d69de2939b96041975b8968d54e7e
SHA256:f1ae63c1eecd8c992d313155101fb2f4e241ce0457edb993371bc5bdca0e4f12
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\SPIRVDLL32.dll
MD5: 1266732106b91bc5ca124e2300cfb94e
SHA1: 7a27cb5e21b008294defb14e1bebc9160064763f
SHA256:ba8176cb57bc4cd5b5af3419d6a6d4d836095ccc219f2c6d3493e263e64999cc
File Path: C:\Windows\System32\DriverStore\FileRepository\spuvcbvmerge.inf_amd64_6525a5c69f443cd6\SPITDevMft64.dll
MD5: fed7e533241231a6656c54a7c28a9c41
SHA1: 2013ad2ded377671dc3740177ee6e44f49988f50
SHA256:18ccbcdf492bdaa5ef9d6bea2ee7c4867e62b339bea0fba0759573bcb0bf4356
File Path: C:\Windows\System32\Speech\SpeechUX\SPTIP.DLL
MD5: c4d73a4379e6f55f698532ecbc9579be
SHA1: fb53b40e6bec2aebb0ba97d86fe1d3c7cce94d94
SHA256:683f604ad40ab82382809d75595f734b672fac75e1e8ef63c94683d11c848d6d
File Path: C:\Windows\System32\SRH.dll
MD5: e2f5d43203be4066f9b1246621b7acee
SHA1: 736dcd1ad06eac8094e1c4b5264de7803bdaebec
SHA256:8a5ff90a911563e9357df5421f71fe3aa0a44a6df21ca2f3aae02ed0e0f8f22e
File Path: C:\Windows\System32\SSShim.dll
MD5: 87a9f6512140d4e8cf244004b80ee73d
SHA1: e836041852dba214e9e2f75a349628b92280e8a1
SHA256:b7b7a2499f0ac528d925e70a277bba8afc9d7cd226717425133fbb00f1f54020
File Path: C:\Windows\System32\ScDeviceEnum.dll
MD5: fcc2186a93e39b31f7fe79929b8ee81a
SHA1: c8873d66963d0f80baabdffbc1565932ec083906
SHA256:c08e100b5c68e84f63f9213cc98c5b6e9fad76b3b3cfaab717e26b08f27251d7
File Path: C:\Windows\System32\ScanPlugin.dll
MD5: be0a085ef9cfbd74f56282f012232ed8
SHA1: bfe6b2b33d25555d147b5512301724db6d166534
SHA256:a5d7ef935f3402ae279ab875baceb7b4787a75ed8b67249a9d71e584c72f7358
File Path: C:\Windows\System32\ScriptRunner.exe
MD5: 4759e644743826b18ea16cc325513357
SHA1: 1a2f587ef18917b46ee9c645dc140b29b9a078ac
SHA256:3bd1a32f7692f1a231363c1bb86c9fd03b6441aea8d1c8e1b07ccaf2665bc754
File Path: C:\Windows\System32\Search.ProtocolHandler.MAPI2.dll
MD5: 23183dfc0972791f4b285a5f1a1b71bb
SHA1: 3adec8d796b283eaac405731529fb429b2876145
SHA256:42526cf26fda553d7b505d21cdbe840f51ee973e8ecf537f481e3023f8e27390
File Path: C:\Windows\System32\SearchFilterHost.exe
MD5: 51acc611700bc947a8ef28502992e054
SHA1: d6a0b864d7e653bdd8cceee419c9eceaf08c6e44
SHA256:17391d28c92b69f49e2cec8c95f8823e4222d062b38315ee01d0069dd6986cdf
File Path: C:\Windows\System32\SearchFolder.dll
MD5: ba761bdfbed033e645c977befe3da47f
SHA1: 4e13a43afc1b8154fc3449d070b153379b48706a
SHA256:e094afdcdf0fe38d3cd04e06b41c25d3e2ff5870321005e78568224e26798609
File Path: C:\Windows\System32\SearchIndexer.exe
MD5: 190ad98db217dfa36ae17f813ee42a39
SHA1: 9dab5e4520dda11998e61592195d6ed6918f7089
SHA256:738c871460e21d724e9d1d492abafdd54428d7f29f9d8a53592612c170fd0408
File Path: C:\Windows\System32\SearchProtocolHost.exe
MD5: f4a8bf80afb4e92434e7c91109c94f11
SHA1: e2892e56d1b5ccd54297332b046b1472494d4c28
SHA256:67da51869559b8d2b57d0037a1aa13432c0061c534d381862acbc260af875287
File Path: C:\Windows\System32\SebBackgroundManagerPolicy.dll
MD5: 078348ff0a3d0e8ec135c637f2974815
SHA1: b4bb2e1aafc592927f7d86f54a75e7023d9df95b
SHA256:f128707c658971ebfaf22502b10137b26f7bdfd88b5fe61e52aaf4f9c4834d68
File Path: C:\Windows\System32\SecEdit.exe
MD5: fe961d8056062e047bcfbd77ebd431b7
SHA1: 2cd7718827c793f8ca53c9fe0cc11d09e450ea67
SHA256:58348e21fb9ae1582e68aa07bf21f87d58db03fe12123b0df5bfb3a7e168db26
File Path: C:\Windows\System32\SecureAssessmentHandlers.dll
MD5: 8f88f17a7fb9bec2d82afdaf81b072d5
SHA1: c70c0f1a701b3cac60d7f261ef6f7dc2971c724b
SHA256:998d8e1b23db68d636786ce997a654137afe7f6870bebadb3fbb4b75e5f7c898
File Path: C:\Windows\System32\SecureBootEncodeUEFI.exe
MD5: 9a233c24d1799c3d98d5d549186c0082
SHA1: 7a83d812fe6077a016735afc4bb1f3cd6dc0aed5
SHA256:320d797d9ff819fdfdf2db86dfe467a3b1434d10a12b791fcd541429fd9f47ec
File Path: C:\Windows\System32\SecureTimeAggregator.dll
MD5: db522ae05029d6254f983cc91facd3e1
SHA1: 533c6965e2d18b79231a5c3012fd1ba4146a4052
SHA256:d8ffa575a7b24cdaf4d3d7778314665882db564df3951953d2c8ea2890961d56
File Path: C:\Windows\System32\drivers\UMDF\SecureUSBVideo.dll
MD5: cb615e2bcf901d8f6c95d08d975031a5
SHA1: 113e88d0d62c1ab25ba18fccc66ec53ecb6d448d
SHA256:c0833522157fc00f2924eaae02efe65227af2a23d79af2c058f686649414423f
File Path: C:\Windows\System32\SecurityCenterBroker.dll
MD5: e1a77ffec93134847e4219e2a10ac2cb
SHA1: d4b3db21b326b68ebc22a45ae8139a53e89dbb21
SHA256:c0ae88a757877bf15044e70e907d5a6306eb2645d1cbade30a5755cd1d619c40
File Path: C:\Windows\System32\SecurityCenterBrokerPS.dll
MD5: 0c87b5557db2c673ebf59f9a411aebe2
SHA1: 3f53778102deac2bb4a7f8dc0aae7e0caf6219a0
SHA256:3171f1dfd3548264137df7f90c5ffa64b4daeb9b89febc0f3c264fe6a2713c3c
File Path: C:\Windows\System32\SecurityHealthAgent.dll
MD5: c49f30b7457309a2b9c6f85b21aa48f6
SHA1: d5c2a491cdee5f854a2d170a6918497b0a416f3d
SHA256:21a58841c477bcb589130b31c81f44ebe1d9b94c8a7fb401ac275d0dd4290431
File Path: C:\Windows\System32\SecurityHealthHost.exe
MD5: 982fd26489b8dcf4468f202623ee6af1
SHA1: d46d16bf03db257f895f9b9567ca493db65fd6a3
SHA256:74dc806db74606745557e6d89f352e001a0eaa8a4dfe946e0fcb28482e2537f8
File Path: C:\Windows\System32\SecurityHealthProxyStub.dll
MD5: aea34f0b28f0b6e98ebe0bc93832b7bc
SHA1: d596f19805d229df90befb6e80cbb467ee90154f
SHA256:f7ceeb70264c158c73130886415c9dab2fcd0ce265c0051450518d90c701a88c
File Path: C:\Windows\System32\SecurityHealthSSO.dll
MD5: 992fa5cc3c3871ce8920194d56ce7840
SHA1: 1b2ddb74749521e6f67140dccae802403c5f0c5c
SHA256:5a57a0ac095146349960e3a745803bdf6c7b59f4bdae9391a242d2a50ffb2558
File Path: C:\Windows\System32\SecurityHealthService.exe
MD5: e672d897f45444b754bba4bd56286aed
SHA1: 9796a51fead651d95c97e57171ef149486765fa4
SHA256:b9238370f551997a3054213d945b5aa76605492cf85e90af37147566b4e700ac
File Path: C:\Windows\System32\SecurityHealthSystray.exe
MD5: 6aa21dc87bdf6531f77388bfad5c73bc
SHA1: dd3fe2ba817c5e4527df8ec803ef39c8ced5c9fa
SHA256:ead5bbb7752377bb4d9bf8dcc38a34969e254e5da87889b8d4b4788e3be0b0ef
File Path: C:\Windows\System32\Sens.dll
MD5: 1ea7972a4c7163ff1d3efe9988404d4e
SHA1: dddfe358dab9cd93ddf631fbcdaea15153638514
SHA256:56a94b1617815c1e8a79d832b0f0cba683c3080105cc4c87dbb9b8eab4cd2690
File Path: C:\Windows\System32\SensApi.dll
MD5: 738256d2e39103441efe79e2c17c39cd
SHA1: 133ca3ac0923dd862e1f75d2734f9f6547c04a18
SHA256:ae507d88c83271e1ef0e8ace3f3782be042f157c1b8018e852a9b1d2f0e98727
File Path: C:\Windows\System32\SenseSubAuth.dll
MD5: 9202b1d6f55a418fd7c2698c9f1ec652
SHA1: e952e68d25ae6f6249768738c95601a38362d712
SHA256:3850acee60bd12138dfb5a82222f2f6b3f8fb16a86cb666e89225d92c5cc40e8
File Path: C:\Windows\System32\SensorDataService.exe
MD5: dc5e6f40e244eef51b011681b2936bee
SHA1: 723259f5c50ea077f54d7452f984e975c6315916
SHA256:79f71a60de4f10350d15c1564ce475feac10b22fb8e3a40d6777836cb9aeb0a5
File Path: C:\Windows\System32\SensorPerformanceEvents.dll
MD5: ebc5c3b61d70abb0d58732b28b6eb74e
SHA1: 22ff5827c4c29b2b797c28b7f4092765747ba497
SHA256:862f515c91af5d1bd0ba0c4676d2c78f95153edbd67e2427b9bcb9bc581f8706
File Path: C:\Windows\System32\SensorService.dll
MD5: e4b20087cb03ae95d78c2ddbac956da6
SHA1: 5a75ad3a04adf204782c974ec8cf0bcd12c65fc9
SHA256:5bcba6f0ade32c4290506c2a2845e4ba1bb0e63c3120b535d5d46d8e0ca73101
File Path: C:\Windows\System32\DriverStore\FileRepository\sensorsalsdriver.inf_amd64_3d871eb8eb330681\SensorsAlsDriver.dll
MD5: 7e8f8e3771568ed3f9206e98e3d2a5a1
SHA1: 5b4a3d9546dc4d1635b5ff455b750a882c2d8a5b
SHA256:d397565c08030addaeece8ff534764c8603e39cb0e912ef2958d94e76b270e04
File Path: C:\Windows\System32\SensorsApi.dll
MD5: 5c5f36cc780cbaf51dc20a50b3d889c6
SHA1: 871988a7fd3cbe71685b2cba2364f4b9b24cea46
SHA256:79528054160b367aff0a37877a6aa4c239267e3308a2aa587c9fa61c2f3361d3
File Path: C:\Windows\System32\SensorsClassExtension.dll
MD5: 5b3ece0dd7e9860810cce905db2c6eb9
SHA1: 4a469decf8b08553c38a65645e9e82e9a4ed5939
SHA256:cfa853ba62ea30656ed86881834cce5cf8272522f97c6635edf39d3a0d9c34d4
File Path: C:\Windows\System32\SensorsCpl.dll
MD5: 8ae80efae1f18f4e260165d7b3d4e693
SHA1: 0e2bd140f301854375959a23e81089e7b562306f
SHA256:69a93fcebc4fabba8e7e869053fcf5a807e7645131bdd19afd88f99a4638d8e5
File Path: C:\Windows\System32\drivers\UMDF\SensorsCx.dll
MD5: 1c972d9a9434fe0247a004af69bc6485
SHA1: 2112be68b5fa3ab5d77ab5b75ed8e2757046a770
SHA256:67406712a5b437612add10cdb4f5df1b665221be76b598a697cc641e0f08edbd
File Path: C:\Windows\System32\DriverStore\FileRepository\sensorshidclassdriver.inf_amd64_d5748f7a3c584c26\SensorsHid.dll
MD5: f5e67ab4ba27e47ac706e14d789db39d
SHA1: 37efe69854df7963129e53684891a92ac19343f2
SHA256:919f9172c96843e61645a4f8add6af78f27134d6cf91f1cc2cb878d15a7bccdb
File Path: C:\Windows\System32\SensorsNativeApi.V2.dll
MD5: ae3442b5663b7ee271925a9205588fc6
SHA1: 80f0fcfbd838084d5811baa46acd9ebce0288ae0
SHA256:7be925f5b9c3aaf8be7920a197a564f78ea0124f6c2a72f0982317e3b0359a49
File Path: C:\Windows\System32\SensorsNativeApi.dll
MD5: 63cabe74840dbb18bddf88a496ae76df
SHA1: 2e36da9188d40845185276317563b5baf405ae77
SHA256:7e2018d4cb4a914d1c5ea04a8f3912ea33fa35fb8c56559b33c4f096db5d7ed8
File Path: C:\Windows\System32\DriverStore\FileRepository\sensorsservicedriver.inf_amd64_ce1d18b9e867a63d\SensorsServiceDriver.dll
MD5: d4a553b24cd1e309a169104a1f3181b3
SHA1: 4c8488579cbc6103179ba8b189e7598b6700e37a
SHA256:c595baff099287ea0eb00ceb24763d41dd906a942089cecec21f561cc8f3967c
File Path: C:\Windows\System32\drivers\UMDF\SensorsSimulatorDriver.dll
MD5: 3d9769ec15095457f4025e69963be54f
SHA1: 925301c90af2eee71d8246d5cc7a87d6f3be088d
SHA256:2920addb59b1a6715ab53bac729e93a8103fb887f57e43ec669d7f6d37833c61
File Path: C:\Windows\System32\SensorsUtilsV2.dll
MD5: 314013981ff23b74e7d59f13e789dbdf
SHA1: adbe472b040642b2330bddb341b2fccabfae98a9
SHA256:d513e6e48f07ca94d96e78ca26ec32a7eb3d03f700825236ad9c14de147bed62
A vulnerability, which was classified as problematic, has been found in fredsmith utils. This issue affects some unknown processing of the file screenshot_sync of the component Filename Handler. The manipulation leads to predictable from observable state. The name of the patch is dbab1b66955eeb3d76b34612b358307f5c4e3944. It is recommended to apply a patch to fix this issue. The identifier VDB-216749 was assigned to this vulnerability.CWE-330 Use of Insufficiently Random Values, CWE-341 Predictable from Observable State
Vulnerable Software & Versions:
Description:
Serilog.Sinks.File Write Serilog events to text files in plain or JSON format.
File Path: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_12bdb8127c4c0458\Serilog.Sinks.File.dll
MD5: 91fae373f1f264ed3256a085e09d13d5
SHA1: ac0c4d9b63265efec4e0dc963e09ec14f95effbb
SHA256:5d1e7ec1e86097eface288c2d70b2939ee74927baee2b6358890cf4da378af10
Description:
Serilog Simple .NET logging with fully-structured events
File Path: C:\Windows\System32\DriverStore\FileRepository\igcc_dch.inf_amd64_12bdb8127c4c0458\Serilog.dll
MD5: afd9e5fdf54c69de30ae4cfa88908bfb
SHA1: 597bafdd7d2a7473209450211387e3cb300d0e8d
SHA256:2b323ea16181ad4f660598a3fb01421095b97c0193cba4e6787bd15216ef93ef
File Path: C:\Windows\System32\wbem\ServDeps.dll
MD5: 385254cd3402f194761c5faeaed88e3f
SHA1: a3fbb5af1fbc618dc93774f8d1e91ebb4e99a5b0
SHA256:c7b8310db4261fab567dbf086063d374db4af62ec2f8183ae0d28e8b92d1373b
File Path: C:\Windows\System32\InputMethod\CHS\ServiceDS.dll
MD5: 3d28da8fff78729cd68a99627f6f8c51
SHA1: 72f1bdbfefac3b9c0e3df2fef2841f00096dafd3
SHA256:10a0ec76c37ed4b47881461e67133038567037ead7faf81e00858de7f7aaa83b
File Path: C:\Windows\System32\migration\ServiceModelRegMigPlugin.dll
MD5: 66b8bc69a47aa45879bfbe96eb893712
SHA1: d7563cb4622bb93568dfdec107c53ed2e8156171
SHA256:1259cb72d15a2d1bca4a7c47f7ccc0fbf8415a9d3a63e8173811946b643b0bd1
File Path: C:\Windows\System32\ServicingUAPI.dll
MD5: 00353a0021ac1e04d69be7053e6c0a3a
SHA1: 9c097532415f1a903c6ebc9d9adf27e7798dbf5a
SHA256:e276ad0f027383510294bdd0a471af031f4490e53ff7a44ca034f6f1bdab40b7
File Path: C:\Windows\System32\SessEnv.dll
MD5: 6b78fbbc669a0770364a3f7cfbf787f2
SHA1: cad1a7745791ce985512f1d2d2c079f82b637830
SHA256:ef3c090baf16ec1e4d25d3cf0dced0b2093c29794711ae7c22458b531d71392b
File Path: C:\Windows\System32\SetNetworkLocation.dll
MD5: 1f6bd9453e5d4a3d4f2098abb492de6e
SHA1: c538b0f993ee1f4502c27695e3c1f430182eb1e9
SHA256:1a39beda45ba2e1c691323852da8ca3194f8f10acd7080d78fbe9773a0455c82
File Path: C:\Windows\System32\SetNetworkLocationFlyout.dll
MD5: 2294e9e49c2b2f24a028a5b52d8292dc
SHA1: 8aaa46a5c5d60dd8c149c643a1d6399187ae591d
SHA256:ac40b3842a81462e59edf4c2e70645b6c334d265f993a688fda5e80e529a7179
File Path: C:\Windows\System32\SetProxyCredential.dll
MD5: a29bc7de9946f49a15e33ba85d8349c4
SHA1: 4ed562d47f36383a7fc27f0ace4d5cfecd110cf0
SHA256:8a1066967bf7637fb52185f77111ddebb334b55886a230af6f7fd11422bca17a
File Path: C:\Windows\System32\SettingMonitor.dll
MD5: 5e6c3acc7c24f2eb07f7c0c8ae4bced4
SHA1: 8c6a49fe23cc51ead7b356fefed3c9e01ed9a14e
SHA256:b37144d86b504cc10d17fbcebde72f7e2595cb59a3c4d252c07bc80bda613fcb
File Path: C:\Windows\System32\SettingSync.dll
MD5: caefb52b4664dcc3362e2d41afd31184
SHA1: ace8a8e5a761f9ae6ffcb5a5e7b880266cb21db4
SHA256:3c2eeda4e0cff5498b2066c6ee3074b7d808b3fc308fc8b9d41719a3ec1411d2
File Path: C:\Windows\System32\SettingSyncCore.dll
MD5: 0f72dd72ea6720e3b9939eb68e1f6ad1
SHA1: 3c5af67d652bb76548f6c9940d396fb7e0de7930
SHA256:90d762446030923ee0d606cfacee67e7ade3645ad56bb2edac749f32cac3c008
File Path: C:\Windows\System32\SettingSyncDownloadHelper.dll
MD5: cf6bbc2cb51f1ed96e6120764bcfcdd1
SHA1: 977e0405c4177f3b3147723c08d5b3030bff5c39
SHA256:df53e983020145b70e01cb8d9af022df4014c98d2e3ab040ddc6674455ca7a2b
File Path: C:\Windows\System32\SettingSyncHost.exe
MD5: 354c2cc748c6f8561826bd6a1eabf9fa
SHA1: b587f1432af409edc6039bfe558402ca254a7094
SHA256:7e609f4c5d4571492ef94ae5b228c97ed9ddbfe754c08243d2dd615b7e97a6e4
File Path: C:\Windows\System32\SettingsEnvironment.Desktop.dll
MD5: dbb39330dad5849259ffdeebeb92b417
SHA1: 996d7c541b8a26c760a2e3135149fc5b52c66b6d
SHA256:8f89d971a49930664da1fab1527a4e931060942583c60400cfacf5f7aa276e47
File Path: C:\Windows\System32\SettingsExtensibilityHandlers.dll
MD5: fc8caaa432330c52858205bf2f254556
SHA1: b2acf6e901725efceb2b9a1338133ad137ff07dc
SHA256:68c598a5220ceeccf0ea411ec2fae0f9a77737fe3578b57d24f81ff2dd79832a
File Path: C:\Windows\System32\SettingsHandlers_Accessibility.dll
MD5: e4e5f33912455af1f3a74734bccd8e53
SHA1: c9b7c9509f8a1bf7242ddccfb611d19ba002de12
SHA256:4116a932265fed6ebf5845b09d27478177fce938b728553c0d162360339d9aa2
File Path: C:\Windows\System32\SettingsHandlers_AnalogShell.dll
MD5: d52a1ab321d839841a59e3b1c9a3d77b
SHA1: 0841419967f6d32fe76fea3d45e05d3ef7232031
SHA256:e852de4817c146e2f5b8d416025856f9dcd7b1dcc60f9a3930790fd11c4f8df9
File Path: C:\Windows\System32\SettingsHandlers_AppControl.dll
MD5: 99adcd37a001f526531c05a39c6eeb90
SHA1: daf01a24c84a273458f7bd34fbbec22a3433464e
SHA256:a7b3247f3e1f427ace08c4c605407d99866ba87cb9114f562bc6438026ff0668
File Path: C:\Windows\System32\SettingsHandlers_AppExecutionAlias.dll
MD5: 5d80d667096d14b411550eff53fddf9e
SHA1: 3e1f1fd20720f15bf0cfdfb7c3db22daccf4162d
SHA256:638b610a2e2f93b002bb846b00c7b7c82cee2da2773772377c3f1199f46d6f03
File Path: C:\Windows\System32\SettingsHandlers_AssignedAccess.dll
MD5: 553877c8b710edd62780898386092e96
SHA1: 815223d2917b524a5794ee7a766e26cd733c085b
SHA256:7f1ae1bd0df4da0504ed51e7767b998e55814c31b3cd5d93ec4f85ffea3c36fc
File Path: C:\Windows\System32\SettingsHandlers_Authentication.dll
MD5: 149765b8305f94cbafcc51b707f53a12
SHA1: bc3c500db44804541cae5b724a31df2e560f263a
SHA256:780ec63213f4c793d44d97caeeff8b947a40dfcabd0f8b8dca21aeec3edc74ae
File Path: C:\Windows\System32\SettingsHandlers_BackgroundApps.dll
MD5: 55bbbb97d770ef16480b20113d1ad7c3
SHA1: 3e03a95bb6e33a4f375a2e2059b3986f1e4df3b9
SHA256:5e6fa428e9f078f629e77b0f4b5b65437612e8579aa2d370ea3539d46e96a769
File Path: C:\Windows\System32\SettingsHandlers_BatteryUsage.dll
MD5: 5a458582b8a7394cc0d0aa9835641929
SHA1: 4a05de1f8cb276f68446529ef085942456e27776
SHA256:6f12d2833619177094b05e4bc6d4602516974c9edf34346fb14e30e1b5f02b19
File Path: C:\Windows\System32\SettingsHandlers_BrowserDeclutter.dll
MD5: fa97f1442cfd6c65c8b2f6d5ecba5269
SHA1: c1331e92f4c4a6e210228503d348657a9e3b4a5b
SHA256:38b7b6b227d9a6a7c445b1eb0e5640e08c75852ee735711488dcc5b17db45042
File Path: C:\Windows\System32\SettingsHandlers_CapabilityAccess.dll
MD5: b67cb2beec40f8e5ca0a527c345c703f
SHA1: ddf5b3eba50834a2f99e48fd5969de0f7d4dbb5c
SHA256:f7fa3260292899609abc68400ead37c12be0ccaf0dbc46d3004f2c7fc2a93d67
File Path: C:\Windows\System32\SettingsHandlers_Clipboard.dll
MD5: 107739c49cdaa2ac20f50632b98b315a
SHA1: c9ebc69d5c00353e3badf7b188c639554f859355
SHA256:8688dd61ac54011a99600841b9adade518324573da6c21ac1eb0fe47d889fb10
File Path: C:\Windows\System32\SettingsHandlers_ClosedCaptioning.dll
MD5: 09f07427e6ae92c6fc01bcc89083b4ed
SHA1: 9ce23459ad7c3ef311059fb8dae2dd693db27c72
SHA256:5ae7323a1b0c6d57a5ca16c689d05671239c3211f8de252b9544b35e0a260efb
File Path: C:\Windows\System32\SettingsHandlers_ContentDeliveryManager.dll
MD5: 5304188447061a9f17cfd9603407a3a2
SHA1: ec2d059fdf8a4f6875e6e44b72a9cd42ce078736
SHA256:1edf54b36908bfa0597bf72e5cd81cba1995a23cd6dfd3b9c05a0b5459186d70
File Path: C:\Windows\System32\SettingsHandlers_Cortana.dll
MD5: b43f86db48326dc6977451ad7848f3fa
SHA1: 6e828345fd6199a9eaef567cc50c1a49e320df65
SHA256:104873a0550dbae90fb1730ad754bdea676e66d807406b2c8a89fe31e050a859
File Path: C:\Windows\System32\SettingsHandlers_Devices.dll
MD5: 6d9f37b9a80dd5c67f9d92c189816189
SHA1: b980623fb362030f3ee1eb0e5ce05ea52205d786
SHA256:5579a8478b15cfc795539c82314de2920a275ae445f561339e8f9bf7eb349f68
File Path: C:\Windows\System32\SettingsHandlers_Display.dll
MD5: 64eddbf36e1abb3c0acaa8a07311244a
SHA1: 9b2f6ddca60147befbd3ab339fe75a2654574a89
SHA256:2db545eb21c02ea9a6ff5f351189a016aa42ecb683185d468c37159cdf90921e
File Path: C:\Windows\System32\SettingsHandlers_Flights.dll
MD5: c5ab3f1a446d500de54d15da8fb01f93
SHA1: f215c2e13aaa6658a9662f3be343ffcf2b797f7f
SHA256:bc91000cef4410a2dc0a2cee7d1fa4bc66664f91211072449440244dc9bc806f
File Path: C:\Windows\System32\SettingsHandlers_Fonts.dll
MD5: 78c8c8443dc9f797971bfeb6f11750da
SHA1: 65949072579a0d58145e14d54b3750eecd0f6882
SHA256:66ca0aa5784797c4f5e599dcb8961c310a24145a3a552e40da920f974518dab9
File Path: C:\Windows\System32\SettingsHandlers_ForceSync.dll
MD5: 8a6a3df8fec35e5c050e5dbab9290773
SHA1: ed714efbf2ff4a60d30146373fb17010a9c38301
SHA256:45844bd351c9d47c1e1159055c1190d207c3697f5d2540dc1786c6c8d2fca3bc
File Path: C:\Windows\System32\SettingsHandlers_Gaming.dll
MD5: af7f6844179699f17eb54c94bbc19672
SHA1: c6c9b2c0f132765073ac8ecd0da0669442bb10ee
SHA256:d4152e7d4a4de6f80b839c86a88a63d91cadfe58f59fdf4034146499f43af2e7
File Path: C:\Windows\System32\SettingsHandlers_Geolocation.dll
MD5: 7d6785e91ff79a7e22d75d5e241a5e64
SHA1: 4bbb26701225094c84608a05f5d370b0e314ead9
SHA256:0c6fd25ec2edcd926c362080d2147b00cd496459157f042e2e1550f0c97a4ffe
File Path: C:\Windows\System32\SettingsHandlers_Gpu.dll
MD5: 98594f85fd843ac52c2c248a27e887c1
SHA1: cda0da9c6fa4dd6246b2af409b177ba1e1599dde
SHA256:8f8d4567f7c515190704ab5546c0cc43e9d008b866b9153544364716cef3e0fd
File Path: C:\Windows\System32\SettingsHandlers_HoloLens_Environment.dll
MD5: 8e2fa85fb89519e44d4be70f2960488c
SHA1: e5719946d02e0744d8d27b9c4a0b9fa5847e34ee
SHA256:58fc2dd27e1fbed313adb85492eb5bf2dd3732fda6490c38896256aa2c4a252f
File Path: C:\Windows\System32\SettingsHandlers_IME.dll
MD5: 738bb1ffb91798a0474aa3517c71a5ab
SHA1: 25d86e535f88770236f891ea679231878a349a40
SHA256:0b2f306fd63c05e9ba5addea202f4e1cff61a450ba463e20f596e312ed5329f1
File Path: C:\Windows\System32\SettingsHandlers_InkingTypingPrivacy.dll
MD5: de5fcc3da80a1895eea26e00f7ee707c
SHA1: 0998a12706534ff44927739829b60b4c34bf257d
SHA256:5e7bd380776d2d4cd7922d9ce172f0fd634120e681c82aa8455db138476936c7
File Path: C:\Windows\System32\SettingsHandlers_InputPersonalization.dll
MD5: 1ce82d5f13da3f5ac4db5c14218140cf
SHA1: 234af813207c632015dc0b3c3386d33c68bc8899
SHA256:4edafdbb5dd3f5e4dd03dba30656dc55aae56a032dce201d702a54934da62b7b
File Path: C:\Windows\System32\SettingsHandlers_Language.dll
MD5: a71f35293eaef95abc9fe545bc23fff8
SHA1: 274638b9c0ae273a65c3d15f889a1a39d14925bc
SHA256:608d42afa1c98c9fe2f7741044ed87de12a995a71fa1d3a66941434a158d9605
File Path: C:\Windows\System32\SettingsHandlers_ManagePhone.dll
MD5: 353d8eb951f9b8b4c669367e955ce589
SHA1: bef9c5634a4953909105febd0d610d15999b595e
SHA256:b8b3c50b2587bf311203127b246c4ec039643f130a8f52876c5dbc57cdc3576c
File Path: C:\Windows\System32\SettingsHandlers_Maps.dll
MD5: defe097a8948867b98e4d9469acd261e
SHA1: e4ccabf454a5515a05b03f6f57d3b3260b15b21f
SHA256:0a865a30ff4fe085dc4d91cfd988fd297a48b202f8509b63b6c95bb8b3d13755
File Path: C:\Windows\System32\SettingsHandlers_Mouse.dll
MD5: 91def344fd857d4729086abdda842f48
SHA1: b57381409941f0bbfe94427ea30c9bcc0ed2bd42
SHA256:39357cf466b222a23ee8e4d2f2c8cfe429ee21f03cbf79d2fa778e6bceef0704
File Path: C:\Windows\System32\SettingsHandlers_Notifications.dll
MD5: c9438f710176917e8b87b58ae2efdefa
SHA1: 163f0d1f0ce20f4af6512e8d4f1cf5f2db5cba42
SHA256:913e687c0f0886a5ccdd1c97c7a5adcde84015f1a36b2d3bc1a445276da645c3
File Path: C:\Windows\System32\SettingsHandlers_OneCore_BatterySaver.dll
MD5: 6dc97afa49f61ab3fafca66f36a0829f
SHA1: b98c0b0e4196d03e2a91b63497c947e6d9def64c
SHA256:3a5ec11c70431a00d47ca4be9cc4141e95c01ddf6d3b011d8e7767b9d7c08c39
File Path: C:\Windows\System32\SettingsHandlers_OneCore_PowerAndSleep.dll
MD5: 987e756b57f0ed0f8f4d2fb5ba828182
SHA1: f8e743f069a68979b5b3ae31eef802cdb3237df4
SHA256:9ac1f9c879fe5204c8b96f14cbed19ffb004f25bcf88d982979e42f27cf394e6
File Path: C:\Windows\System32\SettingsHandlers_OneDriveBackup.dll
MD5: 4b87a8c6dcd541351dd8bba87ddde5b3
SHA1: 98bc2c7088197b0ab4850ff9234f01416e1b1738
SHA256:0dfb42a0710a2ea77c98e23151de8eea771d919b34e043215e3824aa11015d9c
File Path: C:\Windows\System32\SettingsHandlers_OptionalFeatures.dll
MD5: a09e46aa048dd5574ac96a9c87850555
SHA1: ca1716a14ee5eca7064d7920f6394b7210f0a0ff
SHA256:b2a0b725b56c00253ede0086b9c4a5161989f4b560b6e54d2b2d5ae5155bd338
File Path: C:\Windows\System32\SettingsHandlers_PCDisplay.dll
MD5: acb542e74f26dc535587c838b70f1c61
SHA1: a8dfee0a5cf2f45029c83831cc4bf673c4086dff
SHA256:4e2db6c0cd7db6baad37cfb6590aefa8cd4c7ef45f0ad7efab26c4be9bd2387a
File Path: C:\Windows\System32\SettingsHandlers_Pen.dll
MD5: b5cf74009d28bb3ca093ff7475305406
SHA1: 26e4bdb8f4508940c1672741aa147e76db7ce6a6
SHA256:8327085c79f6007820dfdb0c0eeb1c91a7c53372143e91d87288b157e196c760
File Path: C:\Windows\System32\SettingsHandlers_QuickActions.dll
MD5: 70df4ef88b20cb5264f5987bcbf29b92
SHA1: f1dc7dbcf216777368128444e498cc2156b3f045
SHA256:0bc91896fe0387d76932a647e6019954868956af2888c9ce7aab1bc4b5bc2c96
File Path: C:\Windows\System32\SettingsHandlers_Region.dll
MD5: 21f8c4cd41d40d6e8f1e2551e2155446
SHA1: 78a99947e1f1ea17206d107c7e531119d1e8ff0f
SHA256:13a00294f294f7e3dfd9cabdbc10b1682a3fbe494849e7fb5bcf520cac3e3653
File Path: C:\Windows\System32\SettingsHandlers_SIUF.dll
MD5: 1fa9b4e47b7f8baa371000ac90c1c647
SHA1: 49eb5992fa369bf255db8fb2ee359a9aa459af08
SHA256:ba677009f7b05dbbbbf4a5a27d74afa71ee60e90303eeb7bf1912c23c59db610
File Path: C:\Windows\System32\SettingsHandlers_SharedExperiences_Rome.dll
MD5: 58bc28e22056abae77a5ac7f0b2f5d21
SHA1: 3135fa6577610ffec886901026c9468f9e74b4a6
SHA256:37b18990692d852b08dd9cd183fd44192af732c901b07035af57c5260ca58f9d
File Path: C:\Windows\System32\SettingsHandlers_SpeechPrivacy.dll
MD5: cc487601f2d55ccfadfb08ac72e46b31
SHA1: 388e21af043a7f729cc9e62b07bb79990f491c60
SHA256:5822ad0d2ca582175e836aa6e363679f12a0ff7b4d51f6bb0a222defa6a399ec
File Path: C:\Windows\System32\SettingsHandlers_Startup.dll
MD5: 372a48070d76a375f2287a2bcc63356b
SHA1: 7e61f4a1d5596c3a27a639e8c1349aba90e28efd
SHA256:922399a0a97d881837954c155cca962965ab50c730edd177a7047fb40698a443
File Path: C:\Windows\System32\SettingsHandlers_StorageSense.dll
MD5: fb67ad33f02ab6f0108e6031428370b8
SHA1: 6977772ab2bb5710b06a82f950ec4be48924cb0c
SHA256:cd845e9988dc2837b06419b695bbb5a5c155138d506ed2752f7462c42cd97017
File Path: C:\Windows\System32\SettingsHandlers_Troubleshoot.dll
MD5: 6ee2a88665ddd9cf5f0ac3da3232fc88
SHA1: 78bf139d0e388067866c919376c033dbf3ae7c39
SHA256:dfc0065b0986bd34fce26b4b8578e3802c885e4aa9bf4a5e2bdb102576204573
File Path: C:\Windows\System32\SettingsHandlers_User.dll
MD5: 8a689484ac6004c0c09200b211528725
SHA1: 3f7b3f912ed12c14b80f0b0c3b9c77fe11bd0f4e
SHA256:c53fbfc1309671e8472d4b37a3af6983394a46657709bc2745700a5b2db1b518
File Path: C:\Windows\System32\SettingsHandlers_UserAccount.dll
MD5: f5ba9217107519bed350e09ec7c4b5b7
SHA1: eef56ab29fb5e9f786b98842e71d5da919438905
SHA256:a32434a3788a118e5ba82cd5f2a6668a084f448ae1dd55f54111c54220b27851
File Path: C:\Windows\System32\SettingsHandlers_UserExperience.dll
MD5: ef285cc9a239e97d094937c6dbf67b59
SHA1: 883bbddc020ad3f2b0e81765135c265ebeb10d54
SHA256:68349eaf2c64f4e9ea062dffca3c625e551a3adfa78aa00d0a3c32c8fde2ea89
File Path: C:\Windows\System32\SettingsHandlers_WorkAccess.dll
MD5: cb354a1d895454c49d6393640d644f11
SHA1: 8bb24b2f6f23e8a259c099b39360f2755e6dfdd8
SHA256:b266237041e5acb4c0058010401f7df665a9e9c3655f397f8977ec1b55aef7b8
File Path: C:\Windows\System32\SettingsHandlers_nt.dll
MD5: a21027624a75d86c6ed0a090a0d8b936
SHA1: 73a3a5b30c2143c22e1d6b98bd1e3127b98b19a3
SHA256:d01db0610904161a74f4c10a7b04b51440f6031ebf241a16f0fb789f6595e079
File Path: C:\Windows\System32\oobe\Setup.exe
MD5: 158188c33105a84fbea0cf1a14d9f60d
SHA1: c1400c425dc9c094c9ed9842e3864656d9bbe23d
SHA256:cc71d6622206ab0814a9b043573750994af7f5119a1e01086a6ae749ad4b3fc8
File Path: C:\Windows\System32\oobe\SetupCleanupTask.dll
MD5: 2223163229c5236d412ccc6ec9d16104
SHA1: 1b521c1627cc33444f400aca5b950fc219adb619
SHA256:4158a46ea9741f527fe8fd116a6162ef1b2e2a07e380c6e7d830e3cf18eaf721
File Path: C:\Windows\System32\oobe\SetupPlatform\SetupPlatform.dll
MD5: 98e07e44ea0f89d199c458b2aa21a2dc
SHA1: a8c6ef96ebe568b8c8fd6c66c8853dcc61aed761
SHA256:4f17eeec3fc3ee236b61323884edb89848db3142c6f23cfde127da1cf8d01576
File Path: C:\Windows\System32\oobe\SetupPlatform\SetupPlatform.exe
MD5: 1b69386e589bd601d62b72bd3c959a5e
SHA1: df48335c012e27fe2c39c070bb8b33fc65d82a87
SHA256:56461b7c79dc7078619971e93cdba4edc1d0a71de7924bdd46df72c04f35aec9
File Path: C:\Windows\System32\Dism\SetupPlatformProvider.dll
MD5: c35697a1ce80b310b670c2aec0c0234f
SHA1: 0b4c0bf45f008c09aa51d0152390b4d198df2eb4
SHA256:1467d5059e367ca56a80fc7f169d8f562026f7020e64f12b97a6ee94f92f086d
File Path: C:\Windows\System32\SgrmBroker.exe
MD5: 66757f23140ac0776c86a259bae23f9d
SHA1: 9f7fb05cc43d096595dcd4415848223a40c01729
SHA256:798d49a8e6984ec3c559c40a6d6e7bba1de1272816157aa4e90b41a2ba6a4635
File Path: C:\Windows\System32\SgrmEnclave.dll
MD5: 1547bee5be48c173905220f70cfbc57f
SHA1: 7053e4df9bbf661e9a1fd8ec21b5ca9a568f935a
SHA256:79c7033195518f10578b96eca648394b613241ba977d564347601f36e9eb7d27
File Path: C:\Windows\System32\SgrmEnclave_secure.dll
MD5: 46a8c2bb2de1db0105696cb347d05c25
SHA1: 9c78bf7805b9eb1f0c7180de5da085dac6a0d76f
SHA256:b895570c111054fbee5a048e9fe12c38e39cd09df6e14847ee3a17b85c2a05a7
File Path: C:\Windows\System32\SgrmLpac.exe
MD5: fc76ea5d4ac318188087d35887a6fbca
SHA1: ef6c97f5a75e5b577aa823c4617cf216a41a4a53
SHA256:5336dcf51dd7900ca3aa2396da409f4d194bc0ba629fb7f033b51906730c9bb4
File Path: C:\Windows\System32\ShareHost.dll
MD5: 08469cf754fdca4b94c63ac95b7040f0
SHA1: 1a9ab1f230bda2600b9473dec4dea25e4679347c
SHA256:81dd7fc1a268a12a71c998b556528b1ee9b7010c554fb7f7ffa7bcf174611c79
File Path: C:\Windows\System32\SharedPCCSP.dll
MD5: 00c037e111f0c6ca875d11e963da1da0
SHA1: 69e2011674eb8c3f39f7c2966ba684da469b2fd3
SHA256:8a9a8723384c3da5530ba4ed5998ae22cf9fff6d821321d22c80917f8706b04a
File Path: C:\Windows\System32\SharedRealitySvc.dll
MD5: 251966ac7afc41a1b447b9891246120a
SHA1: 9e4f7ea026bdc4618b55fe353a69d8687a9871c1
SHA256:0f99cd285ab2512a5b5dbc41720cc74cdeb892ad9c671c5f6fa71b1226639d01
File Path: C:\Windows\System32\ShellAppRuntime.exe
MD5: 58cb94f2d923c240ddeff77f5d772952
SHA1: f10f17817df834f4601331dc79418664b5c95320
SHA256:de1913f6a15d8525cebfa7adb7ad2b4d66c3b60f4cfa1569f13a1c6d7a27f915
File Path: C:\Windows\System32\ShellCommonCommonProxyStub.dll
MD5: 2f28e2c1754791add76493bd08df8954
SHA1: 6d5ede05ef92ec758d778c96015001022c45911e
SHA256:827c230bf5bcaa4fb4f7069b3786e7a8be0b7ed029a6d8e32025148c471d90c4
File Path: C:\Windows\System32\SimAuth.dll
MD5: 6c7fd112eebd92b010b0c504a34e55d4
SHA1: 7d1f2bca179bdf84093b388f7b2ab66850bd5d47
SHA256:9698c9a866e265fe542c7f1b0dd3be586b26b19169c551c0190d54af50919f7c
File Path: C:\Windows\System32\SimCfg.dll
MD5: 49a504c7458d08be46af0003f2f57f99
SHA1: 9de8dfa80cb327655be2b8c1028d91bc111319a5
SHA256:5a05cd79676c79fd83152369d61239bb5264f30edc459ca929ef0d9137728a73
File Path: C:\Windows\System32\PerceptionSimulation\SixDofControllerManager.ProxyStubs.dll
MD5: a4f79c8f7a48059719fe45e0ec72900b
SHA1: cb9e1c962203088fc72109b09eaddf6ada6056e2
SHA256:fceb6b50cde219c82bd6354b13f59508ae5f2329ac9612f56ded79bce42ec958
File Path: C:\Windows\System32\SlideToShutDown.exe
MD5: fd18cdc89bfd664e85644b460c37d85b
SHA1: c242494ece2ed744d412fdf77980ee2e18952350
SHA256:c167f7c83952a95633ad4b65d419d162f85066dea159cb011e771c7c1e07476f
File Path: C:\Windows\System32\SmartCardBackgroundPolicy.dll
MD5: ab7971369dde137087b9894f5e354776
SHA1: 82b17c6b0b0ad1dc33786cb85343b67150d978f8
SHA256:ecb329765590d8246a70a0d42bdbe9c4af83718675285d16e55a52c4916afd0a
File Path: C:\Windows\System32\SmartCardSimulator.dll
MD5: 69d0c80fab160af92ccdfa67fa7170ca
SHA1: 38bb3092c1aa9f986121e7c86ec6be71784b054c
SHA256:6b5d2792afd8ea0d2eaca423e5e1bbd340b25d888dd6eb4afa3e5558b3dac50a
File Path: C:\Windows\System32\SmartcardCredentialProvider.dll
MD5: 837e2243b7d8a057c14255536ce2257d
SHA1: 136239776b675657c24f83d25041dfd5182ee111
SHA256:6519e8a52dec0800a0917833126bcd83684abafcc718f55e05411504762b58e7
File Path: C:\Windows\System32\SmiEngine.dll
MD5: 2c51ba1af58fddd91598b3386d5296a3
SHA1: 76ed0357edc97699cf49501521ed0c8651c151ce
SHA256:65f7ac25dd362cc34fdd14b435885c02f6f7fdb6b0146bb8f98815e53eba02d4
File Path: C:\Windows\System32\Dism\SmiProvider.dll
MD5: 97e089eec3c6898bd4159c39853f0dc2
SHA1: ffd3d226ba179abac9d2b24d9081aae1f9c42326
SHA256:bea12ec326503df121ea00e2ab05235d5c89f7040e7481f723acd62feb92f319
File Path: C:\Windows\System32\SmsRouterSvc.dll
MD5: d20fcc5e9662eafdc6a5a99fa722c26f
SHA1: a43d249625e7152f3e1827a847b919c5fd94f33d
SHA256:f2b97c461b6f0c64c0f4442565d75ade74fcc77150e4216fa9d330b2c271732f
File Path: C:\Windows\System32\SndVol.exe
MD5: b2ca6616fb40b0c058a47a1834bbde77
SHA1: 758d3807b26408a670d530ffebc69b70fec8c86b
SHA256:8c054ea9741442fd5f1532d0b643f18687bf1a7f00d104491498959475b17efd
File Path: C:\Windows\System32\SndVolSSO.dll
MD5: 96f8e22c9fd465114b63e6671584ddac
SHA1: 084a979a2412dd61d04fb91dd3735318f01761bd
SHA256:c2083b922dc7f7b7635114c02bc725da7c1634670a1bcd5af78b7f2c6549fc09
File Path: C:\Windows\System32\SnippingTool.exe
MD5: 40337faea9b9872d16eebb025cfeac6d
SHA1: 1a3866a1afb75f8436821320174938277a2eb0b1
SHA256:741780affa1160aaf0a63bfb4f09ed89e2604bcbb9c0b7e9b907e2d92a036e38
File Path: C:\Windows\System32\DriverStore\FileRepository\iclsclient.inf_amd64_75ffca5eec865b4b\lib\SocketHeciServer.exe
MD5: 5472f4cdab24429c2aee0edcc330e775
SHA1: 269b84be9e1a135c66324bd22f124de603a9ccb2
SHA256:fc5b58ec68cfde4fec6d98f143f70964783b54846ca30a8b299ccd1366e72d21
File Path: C:\Windows\System32\DriverStore\FileRepository\iclsclient.inf_amd64_e936ad8266d026ce\lib\SocketHeciServer.exe
MD5: 714402a6a209cb4e9b46023f08c7faf5
SHA1: 36d39a12c0f06a5c01ca319be00edcbbd9496ad9
SHA256:b2ed0426d300cf18bb3181df3c1e413bd3475def7865d3d93ef6f6fc46799c06
File Path: C:\Windows\System32\DriverStore\FileRepository\sndmft.inf_amd64_3adb0fea574c5da9\x64\SonixDeviceMFT.dll
MD5: 369571498714a62b0f6cc60baa0a0410
SHA1: d71167d68b3d8918841324bc861e6fcac826c782
SHA256:cdfc821d2b64e754764e16151784d9ed7fd128e71cc4e3885890dcf310327c0c
File Path: C:\Windows\System32\SortServer2003Compat.dll
MD5: 3f338d9cbd1ce17beacb1955be0574d0
SHA1: 306c90d1e67bc3c0efecba359bfebd6ee0839482
SHA256:e8e6a6218c20e6f5a693496f9f2a921a43b6bba3219fca991e396e98272ded1a
File Path: C:\Windows\System32\SortWindows61.dll
MD5: 9b2849a2fd2f75e52b4e55cd56e1ca1f
SHA1: a4974b4c9555909e21fe90e1774dccdd966ea703
SHA256:c141270d6377a7c24a5ced76645b6dc585ba8446f3ca8ef9915505019858e2ad
File Path: C:\Windows\System32\SortWindows62.dll
MD5: fcb0c1fa74a204bbff00e8503f44e659
SHA1: 056dde898793318a64fe71330b02ab23e31a9444
SHA256:d4813c8ec522948b36224e2e5081fc24028373bebac3427fb0c19509758b9d68
File Path: C:\Windows\System32\SortWindows64.dll
MD5: 72429a58e17ad18c6aa0c17d9738a2f5
SHA1: 33e6da7288ad2d92742f495f26265ce3e378e692
SHA256:ae054c83471811620a9a57bf08e1dffad33973b28403cf8eee6fc57d6d7d90f0
File Path: C:\Windows\System32\SortWindows6Compat.dll
MD5: 90515ff44cf403ac04f95cc1931df7ee
SHA1: 71c722382a006fdadd355d0706aac6e68bbd4df1
SHA256:9c83b24014c1f14dcf6684ae231dbd0c82d9be52a8a8cac3744f592e61eab61b
File Path: C:\Windows\System32\SpaceAgent.exe
MD5: 4881e9390c31ac7aa974b74110ff94ed
SHA1: 6f4132eaac44fd4216e00aa8955aa7219990f6bb
SHA256:920a249a912a137c4760c1bb9303371c8fceb9e3612c9bdf2f882090023b5444
File Path: C:\Windows\System32\SpaceControl.dll
MD5: 3a16be3e4d88b2ecf41fc91c54b37df7
SHA1: 1ea39b0bf433d275a52ac1eeacbafe08e8cdaf5f
SHA256:ade0289bb3ea4fa13685249c716c9086e32ac5dad80b30537b06da142e3a3e84
File Path: C:\Windows\System32\SpatialAudioLicenseSrv.exe
MD5: 8fbc9f7942e7f0332e703962e2079519
SHA1: ad45ca405ec48b57de9f0ace93ef71a128fcf2be
SHA256:931a99b082fbc538536ca2fde78fbdf14a6301771b547036d45e6d3e5b9395c7
File Path: C:\Windows\System32\SpatialStore.dll
MD5: 7b0c3754235d0bf3b82771a3e9f343d5
SHA1: e458c61ee72b6607241cdcd47123ca34672c19ef
SHA256:5e3529598afc09957f5ff719a8128db2a3845e5ce9ec9d9d099603ec5fcbf099
File Path: C:\Windows\System32\SpatializerApo.dll
MD5: 70bdfea6fbcad1622e2bf9f851226cab
SHA1: ece457c8415fe135bf804405565f7790c6738fab
SHA256:8ce5889e7003bfe55ff69b6ec717495f00973f2178a79730619544155ecd987b
File Path: C:\Windows\System32\Spectrum.exe
MD5: b5572c6e65e74b6b251b67f47df56f37
SHA1: 567be470456e8c9753c8c8f663d37417abd43452
SHA256:c4e119a5165a926accfe44778431cfa6513ba217559fd50a9380c872b40c833a
File Path: C:\Windows\System32\SpectrumSyncClient.dll
MD5: 3133939ee24561c9c74f45e7ae6c70ef
SHA1: dd2aa46eb14ed1189feaaefb4e4e11761eb0593e
SHA256:b7d9b17b2812ff1fb3d4f1b5c126cd6d859fe0b25ededb2878405a510be140c4
File Path: C:\Windows\System32\Speech_OneCore\common\SpeechBrokeredApi.dll
MD5: 4d9e3dc9aa5187c5bde2de6e7f3b2669
SHA1: 2a393c26e85924dc2434c60bebb63d642f2f0472
SHA256:121f00b29677d8a4c759b03d29c351a518f15f8087d238d25bbfc56c0a493bd4
File Path: C:\Windows\System32\Speech_OneCore\common\SpeechModelDownload.exe
MD5: a1079eb95368cc5e1c1376418dd14d07
SHA1: 2dda03a4dafacd7be606f350cbbdf8c51ab47707
SHA256:bf5cdcd51c7a22bf676c3c17db06ad4c50c71f51025795fca4ec7a78c6044da7
File Path: C:\Windows\System32\SpeechPal.dll
MD5: 7ffefd6d46bc2a44bc6ee38839bc4677
SHA1: 084832f97cd8ec883960c4c4471032eccaf1fdcc
SHA256:4a71b6060d6bf79943fe96545d6da3ba398182cbf8487c161a33d1f1161da45c
File Path: C:\Windows\System32\Speech_OneCore\common\SpeechRuntime.exe
MD5: a8ee0f8bbc3ad0b88340f2d21b410cf1
SHA1: 4e5e32e8b91ad67e26323683f1e8b3e4be1dea2d
SHA256:2de3ea69ddfa3eee33e1ae5dfbd50bcf830d88910ab585429aa112a9ab3c2fd1
File Path: C:\Windows\System32\Speech_OneCore\common\SpeechServiceWinRTApi.ProxyStub.dll
MD5: 74c8f356d9d1f10eed369dd82a71fed9
SHA1: 4f53c830f028a1b8f4ca3972856895eceb7a39e6
SHA256:0c20cf6287d7a6cc6c0fa29073cfa2f4086395e4800e359c9b03065367b1e02c
File Path: C:\Windows\System32\Speech\SpeechUX\SpeechUX.dll
MD5: 6bfef5d4ba0c93c0bce2593bac58015c
SHA1: b03839587dc0cad96277e0621850d6b151cf90a6
SHA256:a7e2602ce3d1093712d316497d887d0c97a9738edc026726055bf07572d84099
File Path: C:\Windows\System32\Speech\SpeechUX\SpeechUXPS.DLL
MD5: dfec0317a1ea262d948a18424b86c2ba
SHA1: 25bc5196e6b47aa72b4f09752382ff2c860ff19b
SHA256:9c58c0059f53cd8b796a56a8d3f585a001fd29a3037fe8393292f52dc6ac1944
File Path: C:\Windows\System32\Speech\SpeechUX\en-US\SpeechUXRes.dll
MD5: 2e186a7f6e00285ca1600f6ec0e6ec60
SHA1: beacb51296f4d3a1444025627c38abaf21ed4d4f
SHA256:052b316586906985c7c372ecd28b497c3c5ed2a7bf9f08e49ab31003f479e4d8
File Path: C:\Windows\System32\Speech\SpeechUX\SpeechUXWiz.exe
MD5: 02bce04d6192eb6bc85a195e0187e707
SHA1: 975ecd7e4d51da13584f8453c9e4959fb94c0545
SHA256:6fa424ddd31e80d679d987fd94fb2a35d8bbead7f5f09404af531b46dbae85b6
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvCamera\SphericalEquirect32.exe
MD5: d8a28dc3230c504bfa75ffd38229eb14
SHA1: a028ca603fba9d9f50b15af89cd9d9a4c029b88a
SHA256:b6e0c534d9ab5764a424e523081f781e7cadf90c5c6134531eb3a2c29fa1efd7
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvCamera\SphericalEquirect64.exe
MD5: ffd057cabbf7bf53efc77f8a003a4674
SHA1: 65adfa8f3efbc9e765709c1fe0d7073b01f6fd94
SHA256:f207c52328f76f2b37109102ec87c1414f78e217eff76d8b1ab512cc28f4a60f
File Path: C:\Windows\System32\SppExtComObj.Exe
MD5: 157d09b20f24a9cc73a06b486d473f32
SHA1: ccffc802773463031397b89138cc3d64930182d6
SHA256:9042a8b1a326b7c7588b80e32406631826dc7931d8566a98de6871a90edde69e
File Path: C:\Windows\System32\migwiz\replacementmanifests\SppMig\SppMig.dll
MD5: e3762a46dc0f0ba05c4deaa5021c6518
SHA1: 48a8b0298917483eed19cf98651d3122e9276d86
SHA256:59f27e59622ffe206d4937533a25a46b20f7cfbc4026936a6a5c7982f6c97424
File Path: C:\Windows\System32\SqlServerSpatial120.dll
MD5: 5a0268251012bce38d4a82bc4a6b9097
SHA1: 346966730b181325b559fac85a69c3a97b84d694
SHA256:c484ca570176e14eed6cef5d60fd0b6d225be1c14b385f5d35fb60ac193e3e6b
`sqlserver` was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.CWE-506 Embedded Malicious Code, CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions:
File Path: C:\Windows\System32\SqlServerSpatial130.dll
MD5: 8dce69f58446b03cc68f22cade2a248f
SHA1: 50e9f355ae0fa39daa9a370d98c422cda056f809
SHA256:632137de8fe13844357b73ef3c9bd0abfd2a30fb858521b00ac97a829bf8c144
`sqlserver` was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.CWE-506 Embedded Malicious Code, CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions:
File Path: C:\Windows\System32\SqlServerSpatial150.dll
MD5: ee22840ab186b37c541fcfbe89b185be
SHA1: cd73d5198564f1680320ba303d3e518346e77349
SHA256:0af2ee1cb4d08ccc9e7011338b58ac05bb40d35730d9882e63d92db92ad5c93d
`sqlserver` was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.CWE-506 Embedded Malicious Code, CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Vulnerable Software & Versions:
File Path: C:\Windows\System32\SrEvents.dll
MD5: 446107d68a7f9f1e8a8edddea64e4c55
SHA1: 7e7bd3055539c1fe9f3bd7721077111e2233d8b4
SHA256:36ce0d808a5bf49caa8bca12f8eb71d8c34c879dcc4208e94f47cf2d9d7995c1
File Path: C:\Windows\System32\SrTasks.exe
MD5: 319dc5f2595fee31a3c41ebf114c6b84
SHA1: aebc6eb2af91ec6bf74112347df5b29e7f20005e
SHA256:d3ba4fbae89219370ef44a08fc1d56d0f9e1642794ad95e794b16594ecc38b70
File Path: C:\Windows\System32\SrpUxNativeSnapIn.dll
MD5: 0ea7ff37a15eb5a5713d046712704f1a
SHA1: 65bd0194f49b3c07bd22112830e3c35dd8f4e285
SHA256:1a2917483af68dc9280d373e21e67414c24139ef55cbfc6542debc4f4e673d50
File Path: C:\Windows\System32\StartTileData.dll
MD5: 3c68bb455ce935dfab98232a80eb053e
SHA1: dc690ef261f72e6bae4b0546c87ae40bd446b2f7
SHA256:4d36173740910c570da0c6cf76d5294cb3e7a15c826d807ad204a9fc5c1d7964
File Path: C:\Windows\System32\Startupscan.dll
MD5: 4ea151dbb72d2bb5c73e16a91547e453
SHA1: 7180faf630247ecba675ca96a8ea9ed5c55442d6
SHA256:8b49b3f3d7773802cbb1e1400504fa5ad437502a3752f8149e6bb8d231a2522f
File Path: C:\Windows\System32\StateRepository.Core.dll
MD5: a3e128f3c14e86b837d4fe236c08ed5f
SHA1: ea965a228b9d567bf82fdf55c7cd1352ac9ecf3a
SHA256:ef5aebddbce9bd18ae4646143a55120a7a5081aed1b93a665622c5bfa135c244
File Path: C:\Windows\System32\DriverStore\FileRepository\storfwupdate.inf_amd64_ccad14ca37132a1e\StorFwUpdate.dll
MD5: a04492804d12e0bd1d10608a2a05e6d0
SHA1: 2ac1a73e1f1589ee817a2efb4be7a76995733ec9
SHA256:c4e27ee8f134380728a2d5f0326f561d2c142c4695d5fe1d4ccdb1feb894f0a7
File Path: C:\Windows\System32\StorSvc.dll
MD5: f862c91e44990bb86032d434fccce38a
SHA1: 8ba4f819ba15463972f6e602259e8c70197c396c
SHA256:147e36400e31483626cc67c9de066fb9f8297edad3e8e6c2299447f19fc3c370
File Path: C:\Windows\System32\StorageContextHandler.dll
MD5: b7f9912cdc65a1db41f8682582aa75ab
SHA1: 54ee5b703433f983ebfb6ff17f8277e401f27b62
SHA256:393116208e62a80c2bde5e42bb7804500f0b461a66d9df22624743024fd1e28f
File Path: C:\Windows\System32\StorageUsage.dll
MD5: 76242669ff0d19fe3dfc69b40a10c15c
SHA1: 5c45dba5564037ee4d8473b75a5eb97829a57bfc
SHA256:f862506b3426a2af04023e2e13f5e3bf506a92c320605d73512811bd9d483d5c
File Path: C:\Windows\System32\Storprop.dll
MD5: f7548b3638f702668f2736d3e788464f
SHA1: 202f4ff580317ee69b932401a1f525d662c95f66
SHA256:9f8c39f759da96b3fae7fce77960de7ae9b105a86844d7bee11aa6e91a90b5ee
File Path: C:\Windows\System32\StringFeedbackEngine.dll
MD5: cfa72fb7d84a422999c65ca7f3449d17
SHA1: 818d776569d3721530d04bb5bf92ad5440d76ac9
SHA256:cba93d76f41641e9b36df3b6917efc160fe5f901e589e345fdecc9714fa55b48
File Path: C:\Windows\System32\StructuredQuery.dll
MD5: 2abd6befcaeecdc81b1da30ac6d2eefd
SHA1: dfb09fadcd3d1cac30fe88c5c7f3c07e3b220af1
SHA256:bd2c5a3b020cc354b3d1716c6bfe8bf9bed8ac9d2ff58e959dab6658494f49a6
File Path: C:\Windows\System32\SwitcherDataModel.dll
MD5: 34d2c3771beafbcfa4c0a5903d952906
SHA1: 3194027016c68a8948ddfc0eda94a9354a031ff0
SHA256:0bff7668ace41219d09624d4fb8e42a6d673f52752f66b32287860541a857c40
File Path: C:\Windows\System32\migration\SxsMigPlugin.dll
MD5: 795e87dee5055a5a5b53f91a9c714107
SHA1: c064e5861c4b537a69c4ca2ba6955821999c8a05
SHA256:78f88272b706f19135c7d2c606a6c772804660001e9c6cc6229dbb594a872871
File Path: C:\Windows\System32\SyncAppvPublishingServer.exe
MD5: ea9063d2f0dc41ec5e8c13a6da5dc71b
SHA1: 39bda8a8bdd52fdd9b00da40d925a453c5b30433
SHA256:c701a358e2fff22cc2543334c37f052af51069802573f9b3a9f4fc64d53e1c15
File Path: C:\Windows\System32\SyncCenter.dll
MD5: d2c919659c9a5964406490cf119c3ad9
SHA1: 8191e63ebbc32bf7c931f354741d8319d6fa61b0
SHA256:2549ac1e83e7888189edcb216d191304aa52cfa7c09d14efdcae7227a2795292
File Path: C:\Windows\System32\SyncController.dll
MD5: f33fff29132551d2157afda08bb1e5cb
SHA1: 7e4be4e1620e83ca0548bb9cd7cffe49f9df5437
SHA256:9833bb679c8af6b81889cf9046965c44878167e6eb99aa35feb4853f31c7a2ab
File Path: C:\Windows\System32\SyncHost.exe
MD5: 27d041ab77269a5fc9c3df3b2c22466b
SHA1: 3ff05e80ad5b590f19540f0e6d1a557c3bc42120
SHA256:e94e7ac9e34d9979070ca2d2bbb1ea65300537c61a56b6e8766245b94dfbcfb5
File Path: C:\Windows\System32\SyncHostps.dll
MD5: 6a335e2fde5c60156ea2759fea471341
SHA1: e90b1fd29f68fccb831463f5418274934ad45f30
SHA256:b74e1ff06f91975379cc777fad383bf6822520043d0d096346a72ee148b3bf7f
File Path: C:\Windows\System32\SyncInfrastructure.dll
MD5: 124520205ca75313f0cf89099015a7f7
SHA1: 982ce7071e28a5f6b2a824cc81620b98ef8a91d0
SHA256:a1a58ea4a656fa1f041f8d84193b1ccb352198fefb259aa2004da2fe69737208
File Path: C:\Windows\System32\SyncInfrastructureps.dll
MD5: be0064d7e7f107142bd19cbe00435fc7
SHA1: 534f50693549a20e37cddfbcefd0e412d87d8159
SHA256:94968c4f0473fe4233bd05a5950384e88275d5b37cb720a44188fcfcc91fa0c2
File Path: C:\Windows\System32\SyncProxy.dll
MD5: ad9ddc29b0767c6aa2d3666ca85a5dd8
SHA1: d9cc375c2013cd6d86d8deb839f8d330552e7d76
SHA256:ef0525a0fc6273e78578f8aefac757da6e3174f25f7df395cb54b85033093327
File Path: C:\Windows\System32\SyncRes.dll
MD5: a4155561137798a67c277660a03197e9
SHA1: eadab5d7eaf3fbab3543bc0aaa7a98b816da85aa
SHA256:f56df7a6c02b90695a6b1b0f4bb97ac71cf673fa60d9db2ed888837e87c43095
File Path: C:\Windows\System32\SyncSettings.dll
MD5: 83235cda8adadb41dbc9089e6f12a894
SHA1: 623eb468fbc04cc57ec8183aa444b027c1bf75fe
SHA256:fc44b80a3aca7453d8902787dc5ce00e6aa84d848256c1d820cf350ca4652dda
File Path: C:\Windows\System32\Syncreg.dll
MD5: 448164f00734b0836b0bec2656399068
SHA1: c20f0976dc160b56a27ac3176c90bab10f093ea9
SHA256:ea8152f4576979c4a89246988c7635a3ec5a76a675fffb751580344c5f2177b6
File Path: C:\Windows\System32\SysFxUI.dll
MD5: b6cf31f95de3e20812d71e6fa1fa19e9
SHA1: 0ac57d6786d24eb8ef319df3ca3771f2749b9584
SHA256:cec4641f9ca2fd62bc42bf04b2af8c50cca3bc9e5955bc6f5ca8f97c2f937644
File Path: C:\Windows\System32\SysResetErr.exe
MD5: 268f4b957ea9ea0ec77b196b51211ca3
SHA1: d2c7bf6b5e8dde7c142dc05a4703d58a4899b624
SHA256:8dbf5e24ca22996de352b80ed6ac6779e254c0c71674fd8022489bd80bca32da
File Path: C:\Windows\System32\Dism\SysprepProvider.dll
MD5: d2b254097ee4c8d3d87e6b450e38e8a6
SHA1: 2fb26e509ca4261e660ee8f1da1a0e9db12925bd
SHA256:663d8e04f20c8ff6256e680e57cdc738cfc3cf7564ec5f507493dd5ddc72b27c
File Path: C:\Windows\System32\SystemEventsBrokerClient.dll
MD5: 2035c858ca14aa54dccdc41bf50bd8a5
SHA1: 833150861847857a57b4f66bc184d130fa66fbba
SHA256:8fcc337080a07071784866a27a73b9c53766947f93a7ba90ef33cf2567fe1e80
File Path: C:\Windows\System32\SystemEventsBrokerServer.dll
MD5: 0feaf169e04e05791b8dad080b6b41a4
SHA1: 875451ab68987a1a424f10fb62b4027b7f883dc1
SHA256:192f5364e9736244066c3ff36d90b3cf6b7c3b41344a7048166dda0dfb59f700
File Path: C:\Windows\System32\SystemPropertiesAdvanced.exe
MD5: fa040b18d2d2061ab38cf4e52e753854
SHA1: b1b37124e9afd6c860189ce4d49cebbb2e4c57bc
SHA256:c61fa0f8c5d8d61110adbcceaa453a6c1d31255b3244dc7e3b605a4a931c245c
File Path: C:\Windows\System32\SystemPropertiesComputerName.exe
MD5: 6711765f323289f5008a6a2a04b6f264
SHA1: d8116fdf73608b4b254ad83c74f2232584d24144
SHA256:bd3a97327326e2245938ec6099f20059b446ff0fe1c10b9317d15d1a1dd5331e
File Path: C:\Windows\System32\SystemPropertiesDataExecutionPrevention.exe
MD5: de58532954c2704f2b2309ffc320651d
SHA1: 0a9fc98f4d47dccb0b231edf9a63309314f68e3b
SHA256:1f810658969560f6e7d7a14f71d1196382e53b984ca190fa9b178ac4a32acfb3
File Path: C:\Windows\System32\SystemPropertiesHardware.exe
MD5: bf5bc0d70a936890d38d2510ee07a2cd
SHA1: 69d5971fd264d8128f5633db9003afef5fad8f10
SHA256:c8ebd920399ebcf3ab72bd325b71a6b4c6119dfecea03f25059a920c4d32acc7
File Path: C:\Windows\System32\SystemPropertiesPerformance.exe
MD5: e4fbf7cab8669c7c9cef92205d2f2ffc
SHA1: adbfa782b7998720fa85678cc85863b961975e28
SHA256:b266318d45a4245556a2e39b763f2f11eca780969105f6f103e53dd0a492bb30
File Path: C:\Windows\System32\SystemPropertiesProtection.exe
MD5: 26640d2d4fa912fc9a354ef6cfe500ff
SHA1: a343fd82659ce2d8de3beb587088867cf2ab8857
SHA256:a8ddf1b17b0cbc96a7eaedb0003aa7b1631da09ebfe85b387f8f630222511b37
File Path: C:\Windows\System32\SystemPropertiesRemote.exe
MD5: cdce1ee7f316f249a3c20cc7a0197da9
SHA1: dadb23af07827758005ec0235ac1573ffcea0da6
SHA256:7984e2bff295c8dbcbd3cd296d0741e3a6844b8db9f962abdbc8d333e9a83932
File Path: C:\Windows\System32\SystemResetPlatform\SystemResetPlatform.exe
MD5: 53d5ffbb2b075bb8d1e1d49f2f0ff774
SHA1: f2803f0bd860067de1ac288e0059c28c81a15ad7
SHA256:260b6137f1d1977f569edef5df5684fe61f5cc2a5e56f351a6309bd97e8e4f16
File Path: C:\Windows\System32\SystemResetPlatform\SystemResetSSO.dll
MD5: dcc03ca820a6f714fadd8daf18991cfb
SHA1: 92d855adac96325defa8aff5fadc1e7a87e14f6b
SHA256:5f1ecb1a57426d2e31f9c898d872a0a338455f71ac8d103b67a4636cb87bf5ca
File Path: C:\Windows\System32\SystemSettings.DataModel.dll
MD5: 452310fc2d9cd4c448964f97b93859c1
SHA1: 2a58725af95ba3dc8e08d2244ced944b8b1c12d0
SHA256:9e0fbc2e4707e4809116f1e1c23a857b498a4487294259c26081aad4a073fd51
File Path: C:\Windows\System32\SystemSettings.DeviceEncryptionHandlers.dll
MD5: ac3c917ec9f2e93e6f5f82707c87b46f
SHA1: 90b5f994b43ea3e673db65cb01087d49cfba779a
SHA256:b8a1cf07e5f1f67a4d5910bfb2014161556729376066880bda9071df0bb50cdf
File Path: C:\Windows\System32\SystemSettings.Handlers.dll
MD5: 00383ab32ef2ab1d3025751af9bc837e
SHA1: ff704e5876f33d2b8643d79c940c10114aa36846
SHA256:0a64256fb4a93d92c6a6eee09885dfb9072f5ba94341cc498d99eed382a0f0b8
File Path: C:\Windows\System32\SystemSettings.SettingsExtensibility.dll
MD5: 5e383898327506f32a7aa2b81bdc4de5
SHA1: e647c2393d764934557ea2a576af929fb1be6f01
SHA256:f4c93300e632702256d2ef4e20d8eb4df57e1e0d5196598806ff54990988b2f8
File Path: C:\Windows\System32\SystemSettings.UserAccountsHandlers.dll
MD5: dfa6c7e8fc569fc433f556fc308722b8
SHA1: ad622ba85ff380b30887bdbd4919b64f44421a74
SHA256:d3c88236e7aae10dec9dce7216449582c8977f8ec3b161ca6df426e008c3be60
File Path: C:\Windows\System32\SystemSettingsAdminFlows.exe
MD5: ee1cf193cb6f29e58503c69ae7c153d6
SHA1: 8e2ff6a6f19a02fee890af67f3dfa48b78775741
SHA256:6ea87ad3269d47c15d10c5fe2c89f1f1295af8b0508d4a20413a7e660b99bdb4
File Path: C:\Windows\System32\SystemSettingsBroker.exe
MD5: 0cc434223c753cbc7e8f62a010e6ca55
SHA1: a3c9554ed7182c375ecace1828cbd0635737cad8
SHA256:b4df01eb464b8d58c1aba418ada9dcfd41d1c32dba1c0f3ec5bc23f855b3b632
File Path: C:\Windows\System32\SystemSettingsRemoveDevice.exe
MD5: e55483620998e6e00b2c923ab1f264b3
SHA1: 8409ac19ba5ab3fe8e5668918029f17ea4275d24
SHA256:e0983b53b0ce9de8a38eee40d7dc3cb30a81ac217a34b3af984a1285d5213299
File Path: C:\Windows\System32\SystemSettingsThresholdAdminFlowUI.dll
MD5: 8456fe72231f1b924ec073b6e3b5b2d4
SHA1: 6744b2f2cb984b081d40c05c88a7e6f7172cc1ec
SHA256:c6da444766794b8202649fcfd8873072fe7957029762e6054897cf0eeab0e2c8
File Path: C:\Windows\System32\SystemSupportInfo.dll
MD5: 1b015fc88cf43ebb27e31d3fe319dd4a
SHA1: 08c717ba90ed04765fa1a09dae5ffb79180c3ab3
SHA256:ecf2a3f614a3e89200ad8f6852841179ba5a49d00f3b03814a16e5f31ce76307
File Path: C:\Windows\System32\SystemUWPLauncher.exe
MD5: 71c7477ac6d44a90b8bb23905df9b6cc
SHA1: 978031dab1597bbe09ac90d52b18e4a1d0acb1eb
SHA256:8a378262194f20d4db4676e9a388e4649cf089544a1b0bf34013e04705203700
File Path: C:\Windows\System32\TCPSVCS.EXE
MD5: 1dfc98f2efa2385a9e1d317f980a5092
SHA1: d264115bdcfeaf71a5cb31fe9b83641b59499790
SHA256:fc2bc4b2b115bde5341c2d40e371a4f50feee14d19aad12eaf5fd0a052bea403
File Path: C:\Windows\System32\TDLMigration.dll
MD5: f45857db7531f6ec535a4ddac9dd46f6
SHA1: 5d15d10a4c269a74f09b1a366f4fad84d6f74b54
SHA256:63bf4048a335b6bf23c6f91e29396b2450509c9f0499c382749d8c82c3b4b9a2
File Path: C:\Windows\System32\DriverStore\FileRepository\dal.inf_amd64_0b214be229a13e84\TEEManagement.dll
MD5: 46577062d6f74a39459a78b73110b950
SHA1: f8bd283dc996f60f10bc878df0060c5629367681
SHA256:24adddfb5d5a3311cace23ce8ae105c957cf6a4bd5d730880a54efe1af64eb05
File Path: C:\Windows\System32\DriverStore\FileRepository\dal.inf_amd64_5acc9ca73ae7cf4c\TEEManagement.dll
MD5: 444f451000b9877b60b32b9ff17747fa
SHA1: defcf5e9c158c44c8284a0d52736759b22fde098
SHA256:5a7ad57aac231a8685ec6b814633414fc3f3050a419e8628a1470c97d8264d3e
File Path: C:\Windows\System32\DriverStore\FileRepository\dal.inf_amd64_5acc9ca73ae7cf4c\TEEManagement64.dll
MD5: 0a1ed0dfa40e8d45770899299b192a4b
SHA1: 57252e6acb61ca097a3a3e5bebe3179dd14ac485
SHA256:a688cbabaa9a4611ba1c8cb3d6ed716f15d4a260a20a4703d87a67274196070b
File Path: C:\Windows\System32\TEEManagement64.dll
MD5: 66391373af004f545003c235b23dea4c
SHA1: 66b8e9912e4de31c367e8f0d69d881f26983669d
SHA256:b0738f8f540b5758456999db7da7f3decda74178a083ff390325d74a44ee6ebb
File Path: C:\Windows\System32\DriverStore\FileRepository\iclsclient.inf_amd64_75ffca5eec865b4b\lib\TPMProvisioningService.exe
MD5: c9e875dd74af305678a080d1de557501
SHA1: 23ff52af884e469c3f04c0a29fad863f50906fd2
SHA256:03026e2dd25405009c95c33681bca7a3395b642ebb8d3afaeb284f2966dc9578
File Path: C:\Windows\System32\DriverStore\FileRepository\iclsclient.inf_amd64_e936ad8266d026ce\lib\TPMProvisioningService.exe
MD5: 39a7f9dae8d6cd05616237648ac57bef
SHA1: ac3e3d55de8f07655ea64409b02fbf40ccbaefdb
SHA256:8077ebd35d352eefd602d9377b38f9c85114f50ba42d6a9bd8648dbee06a827a
File Path: C:\Windows\System32\TRACERT.EXE
MD5: fedbac964787ad4898109a744fb6ec02
SHA1: 1daea40e923ee1fd8c5832274cdd478a45685e46
SHA256:743f8e8a91b2d1e0db9323109034de91a1e065242a33a90bb787a63edb860b35
File Path: C:\Windows\System32\TSErrRedir.dll
MD5: 4a6d13de53e96e8d9c1256338b587d82
SHA1: 366cf4b8dd5aad0b9f25c4eabd92a3a2a110e514
SHA256:9600b4665678f96c428867ea5f269a0a8ecd40a02d6c10dba4eae8357fb801da
File Path: C:\Windows\System32\TSSessionUX.dll
MD5: fbad241cb919abedbec4518836326160
SHA1: b223477319732ae26f49638dc4e2742e223972e9
SHA256:809fef24d707fe6d03f940afbbbbd7f35181a81832acf79745f5f7f6ffb5197d
File Path: C:\Windows\System32\TSTheme.exe
MD5: 02960f6ee8f4a2bc7106021d5445e093
SHA1: cefd1b19bab6c36a23b44371107c76b86d3c5171
SHA256:44e4878facb96ac97664074e335f9a930c2f655caf87ea00272c281b34513748
File Path: C:\Windows\System32\TSWbPrxy.exe
MD5: bf22b7ef25c223e619e72aeb9c12f8fc
SHA1: 2f4635a36e9d100aaf44ddfd9a30fcd3de492036
SHA256:bb6d656b37055fe8e7c7c68452419945f0c9debc56d7e560946c6fead4aeac1c
File Path: C:\Windows\System32\TSWorkspace.dll
MD5: fabda6bc8702c07f8cb24706611a9b98
SHA1: 0f4d5e534676d16aab7009b5c89d754c4132aa07
SHA256:55006ac41b6be038b75e8ca0deff090cac803494341ec111d24aedb9c7fc9301
File Path: C:\Windows\System32\TSpkg.dll
MD5: 7b3da9db56095dc934bd247dffee5bbd
SHA1: 66a2041f056e9028e2a6a11fc53ca0707d9afb8e
SHA256:10af99c9f9cc8cdb13b6e474569b67e5388275d5f3be5878c6ef7471dc7d5267
File Path: C:\Windows\System32\DriverStore\FileRepository\prnge001.inf_amd64_1daeee8f3aa30fcb\Amd64\TTY.DLL
MD5: 11d0a08032382e1945d5bb77f6995d4d
SHA1: 49cc3c17e9bbd33d35df91224e8d85dceaef7ccd
SHA256:25d4e5e676e6d010d29c5866bfcfd8f4ffbee0b070df4c6f730db4790ca8b02e
File Path: C:\Windows\System32\DriverStore\FileRepository\prnge001.inf_amd64_1daeee8f3aa30fcb\Amd64\TTYRES.DLL
MD5: ddac57c81d7a9396eea53ff06d8343f3
SHA1: 9625f9e6c76de6cadcbc5ff4e736f81c6b67c2e5
SHA256:44b2f352b697b46100792dc889f8d7e2175c76b42e06078cedd0a896a55c21d3
File Path: C:\Windows\System32\DriverStore\FileRepository\prnge001.inf_amd64_1daeee8f3aa30fcb\Amd64\TTYUI.DLL
MD5: 51c509492e6e845aaccaab835457343d
SHA1: d950cb6b074450c3180dd8872449d1a0a27ee818
SHA256:b3c55b7153c17f8e706c044aab7f036ea639d0f8cd022a35edff965e45bf3b6a
File Path: C:\Windows\System32\TabSvc.dll
MD5: 23cdeaf7f437a13970514c9f59ec4473
SHA1: d9efdcf9b8140893ae28482318191ed978b8c71b
SHA256:0a77ae20323bd729f18ac852db03f85c4c472a9235a82447c38d44d20dc204a7
File Path: C:\Windows\System32\Tabbtn.dll
MD5: db931bcbb03f78ecd39a793ba37201c4
SHA1: 9f4cb9a7916366c71c07db6446c2fcbfdab4bf38
SHA256:d19342e870809bcf20d3bac6bb7c92ca86253df615dbea835f2040e6e5a94391
File Path: C:\Windows\System32\TabbtnEx.dll
MD5: ee908afa6cffe8eb4a6c35c7a280c78a
SHA1: 2268fb865462c506fb0e46fdd5155d0451244ce9
SHA256:48b391e6f09c532419d4bb279f9d3b6192dca8ea8d0ab83ab9fb2e370abe9c53
File Path: C:\Windows\System32\migration\TableTextServiceMig.dll
MD5: 432300c76bb77df37dbfe3f86ce85fff
SHA1: fb825a05c9eda04a4b0212777eeb9c3d4b6388ca
SHA256:6883f9f32162b99c00b54d84d8c0d6f5bc55dd124cf68b64cbd0aac764b0b60f
File Path: C:\Windows\System32\migwiz\dlmanifests\Microsoft-Windows-TextServicesFramework-Migration-DL\TableTextServiceMig.dll
MD5: 819bbd301c4c1f22752fff9ad9ede9a2
SHA1: eaa2b0d024cdedc0f21ba5aba8d9768dddc9426b
SHA256:cdaf2b3e2cfa28924d2ed1617b84567aca6854ae6ecf082f699b08f734702c4e
File Path: C:\Windows\System32\TapiMigPlugin.dll
MD5: 3fd0f0d4bf069618a9be0020eed77e1b
SHA1: 50cb89ef16d0a37bde485c82accc0d1f91dcc2a7
SHA256:f207c14641d95e8be20fb7d6487d2b9ab2deee0a40bfca6a7416f26fb420577f
File Path: C:\Windows\System32\TapiSysprep.dll
MD5: 960f26b09aa9002e0e1fb05a0f10f78c
SHA1: c578efa3870517ef5d7994081331a084bada01a1
SHA256:dea8d882f6492786d680ae5d94f6f107b072aed8e6ca4f968725d9752cd12d60
File Path: C:\Windows\System32\TapiUnattend.exe
MD5: b574abf43dcc57a359129d1adb4cdda0
SHA1: 6fb0f79d9a7f0108ff817ee418e3436cc51393b5
SHA256:6a960edad235f685e741e0f1a74d1162fd3cf410862192236f962ae289f0886e
File Path: C:\Windows\System32\TaskApis.dll
MD5: efe0b6e6979fd13ae333848d16ff3926
SHA1: d52bb59f270a9e29beaacf769a68db2b19c18fa7
SHA256:f17ad329c0b26386715461a1e9f9451dbf81bb1df38a740c9e7afe9850ab2081
File Path: C:\Windows\System32\TaskFlowDataEngine.dll
MD5: 4065d49052c6b21bc36ebaaf76df00b2
SHA1: 19ee18f858b355f8a99896093686cb50e539d2c6
SHA256:00f2886aadb43e25757481e58277fc78da29598c203c6eea5f57e7c6ea6adea7
File Path: C:\Windows\System32\TaskSchdPS.dll
MD5: daf411fc20361605be273e86153c72b4
SHA1: 2372f6a01d1369e6e3b5dafb85a63d7858eb1e9e
SHA256:1e46c061ab34445aa5cece9b49abad6f1ba5d399184f4274853ee092ab6ebbed
File Path: C:\Windows\System32\Taskmgr.exe
MD5: b10395c7496d4d5faa2492f37c15fb22
SHA1: 3f91f865a6bca44125bf59ee21498fcb96afa730
SHA256:3820f676976699bbaa78970b4850ccdd158c0d1d36e0c637f2b04ea4ae59ec10
Description:
TelemetrylibAddinbridge Lenovo Hotkeys
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\TelemetrylibAddinbridge.dll
MD5: 6ebda1cfea78491cfff4c42562211ec2
SHA1: 428beebbdbb90deb5d15bd3f6334004eaead1a39
SHA256:2fe008a65550407551cd725ca891e2aa9a312bf300fa7041baa5c1f0ae456a89
Description:
TelemetrylibAddinbridge Lenovo Hotkeys
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_fdde6ecd49c3a98b\TelemetrylibAddinbridge.dll
MD5: aa261baf0cc0d7af23a773eb7f2e7a04
SHA1: 174c8d7d955cf16a54d0ae23a54dac988a638fa6
SHA256:0f62acbbc2c1783bcc62f7d74969673f92c328fe2067d9e1f53a8862c114047d
File Path: C:\Windows\System32\TelephonyInteractiveUser.dll
MD5: 12165bb582cb4e205adc1a2e52ede6e5
SHA1: 411170304c77168bd8fb677f269ff655d446c68b
SHA256:0506cb28b6d02d6f097531759bbacff1cc180fb6874605066e6bf8e7d2ef045e
File Path: C:\Windows\System32\TelephonyInteractiveUserRes.dll
MD5: f38298814f74edfc482dd7add8c8fe2b
SHA1: 17e4d57dbbb340e51239bb8a6929e4b369fb0de3
SHA256:151e709bd9c173124aa5b0e1915a447799d8cad3adfa3bf4379d2addd68dd2e2
File Path: C:\Windows\System32\TempSignedLicenseExchangeTask.dll
MD5: a9f9552f93167884bafcd3d19473cb5b
SHA1: 317f9cf7312cd437c904454597d4d803952eeec6
SHA256:b551f483062d7ca9c78d7b1cf7c764473769324609b6229386b354e82a0323ca
File Path: C:\Windows\System32\TenantRestrictionsPlugin.dll
MD5: 8f6c92d4ae665f470520a25510a56474
SHA1: 39066ad652a9ee5c82f3a7b9b0043d476a9f76b3
SHA256:f1bc6972e2c3d34dbbf4f08482be459e895cb470f4f62d2f5798d5ddcdbb68cc
File Path: C:\Windows\System32\TetheringIeProvider.dll
MD5: 83d35b7d5abf0ad4f77161a96503297b
SHA1: 59e0e3f02b8b2ef932aebf934b166cf3a833ca56
SHA256:20329df0e6f537a6e138ce520548353510f2cb5336ed3748779db4b711f7e80c
File Path: C:\Windows\System32\TetheringMgr.dll
MD5: aca6fc83ceb12068fea139c2233ffb45
SHA1: 8c61b77ac594fd14f8818cddbaac192c6af0a38b
SHA256:cdfaa10712fa8c7f511b7f22fd68709517e3f5b59dd18fc2fca87990e013dd80
File Path: C:\Windows\System32\TetheringStation.dll
MD5: 188b45e2dbe8e2f36b209a7d74d8b80c
SHA1: 8c991d8ddc9538b789c6ada1aeeb15e380b9d63f
SHA256:6419c23f7a6c5a9369c01134bbd076f78120e7dff76233a8699d647329f606c3
File Path: C:\Windows\System32\TextInputFramework.dll
MD5: 0c1751764ae95af93f1979201af377a4
SHA1: 80773b3e0a2666f5ea06ab39705a35847dd74366
SHA256:529c8aec560504f8318ab59934559186ee6cde1e09e5b5ee8b59b4ebdf1d2889
File Path: C:\Windows\System32\TextInputMethodFormatter.dll
MD5: b067887168e62481f8d20ac56b1925a6
SHA1: 13840a6b2f0ebb73ecfb2541370bc1bc89e19ffd
SHA256:244034cafa7fce58194cb71857f6eef76643cd724865cdde7f458f1facadf2ef
File Path: C:\Windows\System32\TextShaping.dll
MD5: 0cd4a006cbc275f70988283c9e3a807a
SHA1: d4feafd860c833f056723523d517fa1a98c5a06f
SHA256:25ecef3ef7c0bf405bd8dbd1daf03f743e951c5d63a1f74ef98419c043b69b83
File Path: C:\Windows\System32\Themes.SsfDownload.ScheduledTask.dll
MD5: c93fa7b4bcc75e1b0efd744d21f1ed3a
SHA1: eb5dd2e2d087d199c23173aff7e32e2bf871aaae
SHA256:5ab60b9214ac8c7ceb59ebd6e8e43805bdc993d262729e718264d836d9977ab3
File Path: C:\Windows\System32\ThumbnailExtractionHost.exe
MD5: 8072e580fc41f886344205088ba4d6ec
SHA1: b0ea1addac4dfe089994ac4fab0642b637674a6c
SHA256:0eb2b00c87b8785f36288da8833a6000741f2a3c59d02e010c3174897b70711d
File Path: C:\Windows\System32\TieringEngineProxy.dll
MD5: 83a7a4fb57986ca1e63c03e499779c03
SHA1: 746c02e3cf152e8550ff825991c21b3ac4f0788c
SHA256:ac473ae96b5554bdf527666efe0d57519648a1d6c760eeba522d7bdeec7e6df3
File Path: C:\Windows\System32\TieringEngineService.exe
MD5: f5d34ab4da185c417a3e17f055c963cf
SHA1: beb8bf258f4953d1300d54b3536239f9dee4f6e3
SHA256:cce7edb2c5b0b0d702a6d0f308f5f8f2c3b429a4ba072a109cd494eab912785d
File Path: C:\Windows\System32\TileDataRepository.dll
MD5: dbb24fe5d84817ef52ea6e73079f4120
SHA1: d2ab56e5476e42625958cd47a14805596c19cd08
SHA256:5dd2818d0b09e9b823c3c787c6d49bfa4299469dc8af93418f087df052a43e3a
File Path: C:\Windows\System32\migration\TileStoreMigrationPlugin.dll
MD5: 34a8ad710ef86e8344d521fa75c47e82
SHA1: 0e3436d4b29d47a7434709a53f314f8dc16fa2ea
SHA256:4b15bfed3e6b6c8e70718cade519c72fcba4e7381d6356044584a922f787606c
File Path: C:\Windows\System32\TimeBrokerClient.dll
MD5: 29a3503fe3f36b709600baecdb31051e
SHA1: 93db332536258481e8d4051591b66c0a7a2a2f86
SHA256:cf2108d3a7fda0bdc5c0c7995e81ceb5d4a5c416c085bddd03a628054e04febb
File Path: C:\Windows\System32\TimeBrokerServer.dll
MD5: 684c3314d5894b3eea8e0ea19876c198
SHA1: 5295d8982b44429ce779aca40a6128c50a8fd7c5
SHA256:03f9e055bf2ea73c704aa405d9ae409824efe2679abc45dfcecb326edcdb968d
File Path: C:\Windows\System32\TimeDateMUICallback.dll
MD5: 1b04e39d40b2e439b0d70ecbcd87f005
SHA1: ac8956218c59203d2067b47b47555b033535e8e2
SHA256:130163e62416e5981e7445a763b915ef7be98ad72d0f3bc8a41ec3bc39c9cdb1
File Path: C:\Windows\System32\TimeSyncTask.dll
MD5: 2071a183231e29a3a642342d2a19f26d
SHA1: 49e55dead25dd379d4e23838b5526f42396d357a
SHA256:3497dd3bd62cebc03c9cb1d4ebf12d95632097ee77df728518d1b0e2b1d51a7b
File Path: C:\Windows\System32\F12\Timeline.dll
MD5: 36370f399d1348876dd61b65ea3b607c
SHA1: 044a1bda3a1a3eef6af7e6efd8e66aa0850efd46
SHA256:977afef0ce3085100fe284c6038219654380e16cf375e59e5d22bf728a70c4d2
File Path: C:\Windows\System32\F12\Timeline_is.dll
MD5: d88e8e3621ef7fba6aeeb785327691b0
SHA1: 51787147e4117a4e3ad998608d17219c5c1f0903
SHA256:2095db52702513b51642c46544d79536f845841cafb723b6ea4e5a4f4b83cbed
File Path: C:\Windows\System32\migwiz\replacementmanifests\Microsoft-Windows-TerminalServices-LicenseServer\TlsRepPlugin.dll
MD5: 98b4ade34857f33cbb5bfd840e0796f6
SHA1: faa838d0186552eb376f515dfcae56f90f547acb
SHA256:096080729f94714a8840772d43456024c75fbfc3be63e0163609213ca86467ca
File Path: C:\Windows\System32\TokenBroker.dll
MD5: b54d57d100a3e1d183fb22a170100c37
SHA1: 9ce02ec94438838dedb54812e6766ebd5e5ab76b
SHA256:52a38e1fd8d5cb336a6117e5e59e8cf4a5d1962bacf2b749028e27b8511082da
File Path: C:\Windows\System32\TokenBrokerCookies.exe
MD5: f69f30c594620338acef78125016480c
SHA1: ee47e447a281b4f9d43ab081612b07c84c83f978
SHA256:f96b4cee6ed1dcad97e5dd5c000a104340f752cbfa8012ecd608b99f0b41659e
File Path: C:\Windows\System32\TokenBrokerUI.dll
MD5: 6ca392e4321dc95df3113f05938ecf7b
SHA1: 58e79e8304cfa41472fc116a88b5d4d29df23431
SHA256:19f15fcfa6f1b583040778e9221079c65c34fe18efb5cb30ab216765cd1d3803
File Path: C:\Windows\System32\TpmCertResources.dll
MD5: 02ceff1029b15d9a40eeeda9d9e348ec
SHA1: d7c401b18373427674930c781b75798ee8069d4e
SHA256:ad447da61db13ac52d2414168e3f154861077065ee417d4e5f2f119931424cec
File Path: C:\Windows\System32\TpmCoreProvisioning.dll
MD5: 03e8d2e6077272b53981ce8b10cfe80c
SHA1: 47ca41afb634786873d0d4447bec4f5319f59717
SHA256:f5cb0d14646976e44923adcc9110ca098ebeafc4d2b288fba98fa731eed618e2
File Path: C:\Windows\System32\TpmInit.exe
MD5: 2ef855672a91aa4443e8b4c2e1ae278e
SHA1: 2ab65ea700c05450a48f3842dbc4e7d65c346317
SHA256:06210a3296cfad3af92253bf998536ba1786a8799bb4cab80ccdf3dde30f0e66
File Path: C:\Windows\System32\TpmTasks.dll
MD5: 500ff97152fa4543bfc29dc0866de266
SHA1: 4f90a8e40f209d3a1e340fe315b8743d65a56562
SHA256:2c7de89c02a764eea42152522bbb12eae7ea8b3900d56d1de3a266556540594a
File Path: C:\Windows\System32\TpmTool.exe
MD5: 73f8551f13ea5bfddfaab6b2a5fb4f33
SHA1: cb22fd5a9bc52f4cc8d32058f77ccdb9fa24bd14
SHA256:c9d832e308bc7486c0b1cdf7ad7b54377b89eb2a4cc4d9219f66ff537b465bb7
File Path: C:\Windows\System32\TransliterationRanker.dll
MD5: 60a5787630bf6144b8cbc0624a8905cc
SHA1: 3d539a36d768e0a366497986c6ec93ecc3608b7f
SHA256:c636aa997745af4916d4f651cc565f1bf2d2610a67b9e3c0ea47b72ebc565608
File Path: C:\Windows\System32\Dism\TransmogProvider.dll
MD5: e60476d1585d1388e6e1761ad1fde0b4
SHA1: 18422195c4ffca0e8ba54d81fbe8500096acacd1
SHA256:d9bb6d4e87c1d869a2a8e03d2b0e5ddfeb086207f10d6c559a939f644d31af88
File Path: C:\Windows\System32\TransportDSA.dll
MD5: 766eadb5ee1a3342c85eec7e63a785ad
SHA1: 2bc29c95b6ef6d772432f49a8d322fcf85e7e16a
SHA256:8dd6f90b17ee6311daac8b641b31456b04a81f5a9c10bd32a4839b25303926c5
File Path: C:\Windows\System32\TrustedSignalCredProv.dll
MD5: 9c74d1011827a90254292ae9ea1c48f0
SHA1: afa69fc1de4caaf79315415eb560ce152d27c9ae
SHA256:1a9a24cd134e115c9f147acbe9924176c4e15d219c5deed05055a6a970abfce2
File Path: C:\Windows\System32\TsUsbGDCoInstaller.dll
MD5: 423581b3f66da49702bcc6b3a674c122
SHA1: f0b8bbe42a6e0d32e62ce210db2d02c74d5224bf
SHA256:037d68f489f1b5b4b30b7497333af5d1816841d854990ffd57bbc7362f3e09fa
File Path: C:\Windows\System32\TsUsbRedirectionGroupPolicyExtension.dll
MD5: d89cda3ff8427da82de6cce39008c5bc
SHA1: 33889517517b8953707796d12d6907b039c715d1
SHA256:f44cc1e23d0d192dcfd84069b27704cd0b2a8e7720eee43656f57cb474433762
Description:
Windows Presentation Foundation Terminal Server Print Wrapper
File Path: C:\Windows\System32\TsWpfWrp.exe
MD5: 850beafe1fda7c6d7f76826e572d7f13
SHA1: 86727493d8e04e43f11681fc83db8f19e29bf014
SHA256:330e08b2e5ba65ff55bf520c50ec3bcc7931808d69de9522164e4f78f04579ae
File Path: C:\Windows\System32\TtlsAuth.dll
MD5: 8902365597062397514ac82daf5b3cf5
SHA1: 56d7f2dc22f73e988bbf3b64be986e0a2ed7e091
SHA256:50a088f7cba635f4121ff8609a5777f5e5c9fa6a050b8a2263dd0a3dfe3eec15
File Path: C:\Windows\System32\TtlsCfg.dll
MD5: 899ab6b40af996df15f5e14b5d4f3cc9
SHA1: f37dc129ae398391b5624585fdb0475ee419ceca
SHA256:b9ed4b6a0b01408bfb97310fbbaae66d8781aa8ed125a5235924f1b32b8316a5
File Path: C:\Windows\System32\TtlsExt.dll
MD5: cbfd88f9c1750e666523809054c3b250
SHA1: 654329caaedc1620536570f5c91703a9ca1cec30
SHA256:3059844e316990688bb42838f017777f82b8a80c39f1ed59306377985dddf953
File Path: C:\Windows\System32\UCPDMgr.exe
MD5: 9f400cf28d8f34ac75336c87323decfe
SHA1: f181a4c6ec7f0dd809b7e450211ed2db07198023
SHA256:39a9ea9a4d863106d00cdfcd7507c2e23432056c5559dce14b44d2bc9ccf6491
File Path: C:\Windows\System32\UIAnimation.dll
MD5: 6ad7a40afe5f9d0fab33d0234b320772
SHA1: 057f378f10dc1e6c8ce8f9e37d5cfeafc2592fe8
SHA256:bed117be4269b03390e3f94392a13a16fca25796d732913aa80536889446ed6c
File Path: C:\Windows\System32\UIAutomationCore.dll
MD5: 45d4168d45c792b1671c364a3115f445
SHA1: d6254411ae222a8135607946d3314d9d6a666065
SHA256:e538039b77a1596cd7f61c93f26a1e09ed58664d56156dd65dd0ce0924f416ba
File Path: C:\Windows\System32\UIManagerBrokerps.dll
MD5: c43d7c1a6704be8c3f0d9b31043d139a
SHA1: 9cfa7e200885cee8bfa7c405e3aa611845c91589
SHA256:c2dfcf1b1dfa5e75b8cb8dc8501e62d7029fc7790a522d071fe82f15ceb1e2a5
File Path: C:\Windows\System32\UIMgrBroker.exe
MD5: 05be8be45a77fc3ddd7ca67b32827d36
SHA1: ec6f464fb4cb5cbac988e86b9867d710be543eb7
SHA256:07c05efd35722cc138b9980fee363532e77f9dd3102b8382bd39a03bd2889a1d
File Path: C:\Windows\System32\UIRibbon.dll
MD5: e8f407e40c03a769ceb5ddd12f217e37
SHA1: 7d695c8b02551e35abbb6b03ecb5fe0e76c68ee6
SHA256:941dcfcd96b3d9799945a5ab1b4d4b7d6859682a0af9df38223568d7f3c46a2f
File Path: C:\Windows\System32\UIRibbonRes.dll
MD5: e34a90f691e0b5cc5062b040532a6d96
SHA1: 55f81d3a82b5c1ec3e730812e011b1a73146b228
SHA256:bb2a5cd8692efeb472f460574eb56021c6a53d0fc8f7adee0ddf398af0c1f04d
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\UMED.dll
MD5: 289db80c8f422492290090d25f4f6205
SHA1: 235be8c897511ba5cdea697eb461f09c7ae0b77e
SHA256:629b8b256c3d252f52a0e7f58bf04420f6b5979979a8c4248604fea59bfb5f89
File Path: C:\Windows\System32\oobe\SetupPlatform\UNBCL.DLL
MD5: a1d0cc49ef86d63db6ab4780bfe815ed
SHA1: b5950d0084bf08246d87277179c62d67f9ea4502
SHA256:a5ab3ac6d968921ef73d8ca257d38a7faba7f9e49258d236bd034626b6004f56
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_amd64_8418b8585d9586f6\Amd64\UNIDRV.DLL
MD5: fb2b169f43e4b9655dff398c89bc443e
SHA1: 104120ae65671b7c7d329aefb3029761bd426cc1
SHA256:8b894d5ea5b35edef8ac14894a39ed54acdc8344b1bf6135392fe3b523d92d3f
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_x86_8418b8585d9586f6\I386\UNIDRV.DLL
MD5: c0a1e64951257400dbed6e1254b3db2b
SHA1: 2c145bc067b49707193a26dd5189b51ecb3b62f6
SHA256:6b5fcedbb9544b78e6a39ee29da0f046a46f29643c6531f8c26916eaadbd658c
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_amd64_8418b8585d9586f6\Amd64\UNIDRVUI.DLL
MD5: b820bd77fdecd1e0f0faf37c1b41d52e
SHA1: bd684a1389bc235b0c979ab24f144f2730752288
SHA256:0435a89203a2c66baed7528f741e5f95eb50d7e8a82f630b95d841868828be30
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_x86_8418b8585d9586f6\I386\UNIDRVUI.DLL
MD5: f942f5d5caa32805676d4320687133bb
SHA1: bd8cc55d659c8a23fe2f8b02ffba51ea1e8d4a65
SHA256:2a8f18869182ca3fd081b0bf7b09c0188549f35668f576d7a0541a2e57bf9157
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_amd64_8418b8585d9586f6\Amd64\UNIRES.DLL
MD5: 2f92f9ea950a099b6338fa86ecc61632
SHA1: 3782d377853f40c8dcec3d783671fb8b47fddeef
SHA256:6fd4d38e2cdcdb18b1c6e9e86d1ad91482ad636a7f076392d6b9e2203feeb8de
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint.inf_x86_8418b8585d9586f6\I386\UNIRES.DLL
MD5: f6f52d0b666849e74011d6538ce279f7
SHA1: 14bf2a052612f166e4a8e683ab8ff20d75e30a8a
SHA256:6c1cc73a9d78fdb900d2387b86e2962879b9e671dcfdaf3c7b20a21c7ec5c842
File Path: C:\Windows\System32\UNP\UNPUX.dll
MD5: 3098c3f2c7e91d4631a852b54a21dd62
SHA1: 75698164ad45a20b354dc8c8eea2dee9e799a6a8
SHA256:a38bd48e0e360f7b43e06e2305d3c0293688bebf0dd6fe78f1037bc047b0d70d
File Path: C:\Windows\System32\UNP\UNPUXHost.exe
MD5: f805fe9df604770a6ed309021dddab85
SHA1: 8ac751a83e2d6078bc6f31445098d4c9bdd2016a
SHA256:48c9d5348438d9179de59f3b98df1a51d73ae85fdb976e7b232c78ade4ed191f
File Path: C:\Windows\System32\UNP\UNPUXLauncher.exe
MD5: a0c6caa1cfb8677cc97cb3e9d8a25b7c
SHA1: b7fde7d23ff7a90d4333eb43bcc8e538d748fe6b
SHA256:d7f6b6714bcc558416283f6f98c773f4241384f6573b79c6d5e87dfc51a9d06b
File Path: C:\Windows\System32\UPPrinterInstaller.exe
MD5: b021229074b4529d39fbeb45395e87d6
SHA1: 49561e20a45aa6ca4724c5fdd524673ad722a74c
SHA256:87902e8e487a66880bf2a5b2c19bf25cc5c54781f88be28e77f62851e0551fda
File Path: C:\Windows\System32\UPPrinterInstallsCSP.dll
MD5: fc9262c206ab0cdf828f23a7402cac5e
SHA1: 229ca3af4df80c016ea4d8eb18928ec50c3d7f45
SHA256:120868e9fa66b8b88cc95d1ac880e5d2a2a10bf445f2859d4f416589baca1dbe
File Path: C:\Windows\System32\UXInit.dll
MD5: aba0b38d35a04137f1f04116016ef745
SHA1: 1f56fbf493c393d0d9e4e1beb48589cfb6e27cbc
SHA256:955680d402e35236744e0623a7bda2b00a3067cc4e1359b535e3f589e693dafe
File Path: C:\Windows\System32\drivers\UMDF\UcmCx.dll
MD5: d1089cbe52ab3570a7afacefeb61d43b
SHA1: cb9ac4c85d72215bf0220f66f433e8e8811e9dc4
SHA256:8cb1d7cf7b7915d03a63af7711d562067f421988183b0aad21b295f22434d319
File Path: C:\Windows\System32\UefiCsp.dll
MD5: 2dee672f697529a82feef79aa2cdb04f
SHA1: d4436dcda5b1eb63cb59e3c6d15fd6eaf929f31b
SHA256:539a42d01dab74414c7fb16e7db81c24e7c3cc81ed23b36934a86e5dadca68b8
File Path: C:\Windows\System32\UevAgentPolicyGenerator.exe
MD5: c048906265ab5c4ea7118084a1e316cf
SHA1: 73feb9c5e827548e309dc69a14e833f7f13f2ef1
SHA256:c43cd630ee07a72181e255ebff2bd63f7479622d8f895249614de94a8611b3f8
File Path: C:\Windows\System32\UevAppMonitor.exe
MD5: b54f6f7a63a0e20de1a80d1c8aaa2882
SHA1: 87219685412bd05e56dae1162108087872db5357
SHA256:0be7f413037a2192e3361954867b09de0568ff53a938f73dd8ba1bdce05c7002
File Path: C:\Windows\System32\UevTemplateBaselineGenerator.exe
MD5: c85a5d2c00ff444e9e7d3e31977234ae
SHA1: a773267945fb049f756a0133335c454fce18c380
SHA256:303be386109bd9cf507b72f467ae9ddb22ae1b85fd05423dafc9385624eb1053
File Path: C:\Windows\System32\UevTemplateConfigItemGenerator.exe
MD5: 57c26af3682374941b185a50c4dbfa8a
SHA1: e033b9e3a1208f72d47331eca3d2bbb7e3f264ab
SHA256:ed370e58e64e68c3dbde73cfad811d35048452688a7001a202c1c1cd630a5b29
File Path: C:\Windows\System32\UiaManager.dll
MD5: 8fd4e6ffbb95aaa4fb24b0029a0c88cd
SHA1: cd86d42c4d0b46ce2bcbedd23b0ae563e36a5751
SHA256:2b53603c64140e08f18dc623d4a948b21f2e528a3836b23f61661e45c5a5030a
File Path: C:\Windows\System32\Dism\UnattendProvider.dll
MD5: 4fa1ca63b1f8fe59d6074ca92fad82d2
SHA1: 9da8e65c3196984544db3197cf0b554a8e800a8d
SHA256:201ea386a50b5d4317a66c1889c669ffd2e545a2531e33806aa00605f8852a52
File Path: C:\Windows\System32\UnifiedConsent.dll
MD5: e03199a2ad689073b433c9a1927f9f12
SHA1: a745d51fc64050e60860dac0c2b934fba65426c0
SHA256:ec94d5a661d0bc6cfc0497cfd60a8e078cccca4d5b85ca7d3294535c6656c60f
File Path: C:\Windows\System32\Unistore.dll
MD5: ef2cdb77779b736db602dc599d725abc
SHA1: c9cdf1cffa55f81bcc87b1966e04c0d1d5078623
SHA256:51cbe1b73d23d4aeff1297a6abe550d828d9b96a491aa479c49170c5e67a8650
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\UniversalAdapter32.dll
MD5: 3e4c0ebe2585a416a677d1d6dbfcefbb
SHA1: 7a6dc9635d7767b948f1133671ca93de93b234d6
SHA256:06fcf5a81fcd3e22dd733e291ae7750d76bf51f9f4f35ed3422017825ad2fed5
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\UniversalAdapter64.dll
MD5: 22bb7c441c4af1eccce78a51721613f3
SHA1: 4e75d1652b5094bceb45dda6ca6b407683a3bd5b
SHA256:9758ff1c66903c867fa529dcb7088d443ba12fa847ccf52785b42840798e484b
File Path: C:\Windows\System32\UpdateAgent.dll
MD5: de2dd8600bf5c4713b5e28f159778211
SHA1: 9b177a301b22668dfdb86bdafed7bf2749a319b3
SHA256:4f1d53f32c191784cb28faf75fa1a7c35069fe4444267437e3d7ca25315285c2
File Path: C:\Windows\System32\UpdateDeploymentProvider.dll
MD5: 9b5db9d096e7b74ff4981b7ca2d1e963
SHA1: 0e5c172d32a1ea226a7dcc971c46f473d1b757af
SHA256:334ad4da140de0e658972faca8352eb4bd860ca6d52b0b44f7dd738137014501
File Path: C:\Windows\System32\UNP\UpdateNotificationHelpers.dll
MD5: 1652b2962316977531e210a3dbe8cc46
SHA1: 7eeffdd1b8265043b5e22c8b5be9d1da9407c7cf
SHA256:4f2a8f698adf4e7a2dc7eaef1c22c1b7eb048334207e619901860b95c0e32298
File Path: C:\Windows\System32\UNP\UpdateNotificationMgr.exe
MD5: 9f49bf33f8ba74088ec2fa9bf7493bf1
SHA1: 5f48fb32f4538857112c9d874f2380caeedb10cb
SHA256:729414969628c0c33d7e09a081de7f66bf4be34354ef00367eeb899a429d987c
File Path: C:\Windows\System32\UpgradeResultsUI.exe
MD5: 745810cd86b4a646dc5369e39eeab0cb
SHA1: de12de3aef28b7a0408bc3ff415f1a4c3c68d4d5
SHA256:5310cacf35fea9ae6da0bdd0455813d4715c1e802545bcfa343bc44f679ce16a
File Path: C:\Windows\System32\UsbCApi.dll
MD5: a270cf5704a2ca68fb20ea796d11bbeb
SHA1: 64f3ecc66a0135ae0265c8ec25775fba2ce1f879
SHA256:572ca21cc57ce1b49e8ecd35d9a4b4e98f26c349e7b3f347f12bfde54e45c21a
File Path: C:\Windows\System32\UsbPmApi.dll
MD5: 8add5935d83d0a425c39e369520c4095
SHA1: fdd3fa4ec207610106890244c73f03511d4017da
SHA256:1de000188600696c1d9e57766d3228adf3817f780f1f38915fbb8993629f99b2
File Path: C:\Windows\System32\migration\UsbPortMig.dll
MD5: 6f384ec43b3a12723d4acd333927f4f2
SHA1: a8f354298abb8b4177634a6e5d23c79943db23d6
SHA256:412718e006d13195fbe94377b9f898fa079cddf3b73e2c53dd84c92e477cbe07
File Path: C:\Windows\System32\UsbSettingsHandlers.dll
MD5: 1f04e757bdedfcdeb7440c340f6442bb
SHA1: c1037ca95ecbf8f74700f2d43ed4208d26c01b5b
SHA256:35615fcee716a3dbde027d63ba1b07f9ee963fb6b91f268a9861125690e72c74
File Path: C:\Windows\System32\UsbTask.dll
MD5: 7f53fe3f13833de75819365714c4fe4b
SHA1: adb5986d333397ffc5cb4250aff4fe7ea2e64451
SHA256:6be72be6d0cfdfbf1531c8b76114668e3d43b908270fbc54a8c660cf77fdc76c
File Path: C:\Windows\System32\drivers\UMDF\UsbXhciCompanion.dll
MD5: fd969e0bdd7dedd9cdf8fbdca5bb0a42
SHA1: 4f172ba8db0c62f1a52bd13160a440be5dde6308
SHA256:5ac4185109ee4b943aa7118e41c6e8894fa9daf806099f0c9dd7c85a2c0d7ee6
File Path: C:\Windows\System32\DriverStore\FileRepository\usbcciddriver.inf_amd64_400a61104320a399\UsbccidDriver.dll
MD5: 24e7f92d3e47bc9f9439110bfaa2405f
SHA1: 66922c9583ee20950d235f0214cb6766e091f1e6
SHA256:d5de8c35dc4128f9e613964f4f2729b7e9942ebb46b4ebd1a776a208cc68b54d
File Path: C:\Windows\System32\UserAccountBroker.exe
MD5: ce81519326b959c6e5cb7c1e70e94e01
SHA1: 897e7eb376875b0fa301b678d80f5c7d0b553b04
SHA256:09208c62dbd7512dfabd4c0d4374b84fecad9f7d88c6be44ec470aecddb3f456
File Path: C:\Windows\System32\UserAccountControlSettings.dll
MD5: 926cc15c4a10807a50556be7c5a5c2e6
SHA1: 210b7e2bc6f6c8c51a0ac5e577a9152678b20227
SHA256:fcb36c71f820df9805a94d34fac0009f309103516d02b1a3c1f4528f3353860b
File Path: C:\Windows\System32\UserAccountControlSettings.exe
MD5: b0e583f32d3e01ea7792b86cc20225a5
SHA1: b1674d6af3578249cda7c1f454bd9a7677e9d5e9
SHA256:1e475e6ca0897b25ce9931485209e42d60e1fcb2cd9de4263d0573eb01df9b4b
File Path: C:\Windows\System32\UserDataAccessRes.dll
MD5: 31d3d7429463e1f71474f92ac3818c29
SHA1: b13e33e4b8cd552cfb72d8e559c573879be8a5a0
SHA256:7a445b42cfabf3c39e5795b28df6e061fdc6b7ebc2080b0ccd50154ef7605783
File Path: C:\Windows\System32\UserDataAccountApis.dll
MD5: 9158394d0a21751f66c2a5327e53337c
SHA1: 859a0de0a18a7a10dfbe78408e5c01ce5a925778
SHA256:c8b74a98230a17210e789d030d8a38db9b253bba10956c4b4e0617475a57ad13
File Path: C:\Windows\System32\UserDataLanguageUtil.dll
MD5: 05f82a99dd7a743f8513d0177b6eaacc
SHA1: 2486ddc2e4a796793a7e6595b86a6fb75bba9cb1
SHA256:26c3fd3ef4e0a7524d067f2154b4b56791a305472c26c83eef5a005ef192eb85
File Path: C:\Windows\System32\UserDataPlatformHelperUtil.dll
MD5: db1a71eae8b682f611b57ca40d28a2d8
SHA1: 0e9d890eee555a90467d457859a756ce743542af
SHA256:32791349776adabca7283cbad8318d7b326d6d6b5ebb3ef57d3edbed61358436
File Path: C:\Windows\System32\UserDataService.dll
MD5: 5cff104c9ffef02dc6779fcbb3d29f36
SHA1: f74ec7fe1f7e63faba6041cc84efdd531804d2b5
SHA256:b06826a7f894aba987a422315a462c8dbd6fbe20659a3137433459f7b51d7d89
File Path: C:\Windows\System32\UserDataTimeUtil.dll
MD5: c8b5d0de7b3c3d20f5c627e50074b69c
SHA1: 41f74ded7cd68bda22e9a7ea5ad21f5d0f8733be
SHA256:b62d643126c12df30a4ecef649bc467e70a6024c2db9019dce3a14b5c9f0b25a
File Path: C:\Windows\System32\UserDataTypeHelperUtil.dll
MD5: 5e0c7a88a38aeb479e790015aa740566
SHA1: 0fe9a234362ab42157a2dc8723bd87f16d569922
SHA256:c0ce403d17db3bb8365b879ff442a12a62f408ef9307623d7af61e097e0c8570
File Path: C:\Windows\System32\UserDeviceRegistration.Ngc.dll
MD5: 56ecee1fb8f193fb0edf04f179c597bd
SHA1: 1283f4527b54bd3211f32685bea189283f70bd17
SHA256:2e3a9afbd1766ecf2a8dcde2fd6c0ce9fe47b19a2e7172ff9377151086ecb842
File Path: C:\Windows\System32\UserDeviceRegistration.dll
MD5: dc4321f5cd606931c01b03444b6290a0
SHA1: eacdad16d8860efb5f0c4c61a26fe71d5dade524
SHA256:985437fa57a407267db2623a7b06802813cffd1a402fa0531fe0fc023bcb3cf2
File Path: C:\Windows\System32\UserLanguageProfileCallback.dll
MD5: a1c3174f55a5d4e5c9b5633171047e3e
SHA1: f3c53be91f38b7309d6d8c6d7a2f04ea559582c3
SHA256:15e72bd6ad1bb9f198974d70dc41d0e11f9c65932df4e17eee7eea60231590cc
File Path: C:\Windows\System32\UserMgrProxy.dll
MD5: 8041fcedaa33d53f496da14e592d052b
SHA1: 2973600e8dd1be0012a11da400dc724661d75edb
SHA256:ff14a9d4734a90181009912e67ba31a6f10398f58f4c43f7e21661781b3b773a
File Path: C:\Windows\System32\oobe\UserOOBE.dll
MD5: 3acd44e40755d8006659eb033b11726c
SHA1: b280c0998a5324e43892617faa401e9641dca4df
SHA256:f3333e3b4fd0d910b3080bef1e71ad4a4b079acb614a322b0848e5eb9ce0035d
File Path: C:\Windows\System32\oobe\UserOOBEBroker.exe
MD5: 340b782d4c7ff9a2c5248fe3bdf7c7fd
SHA1: 2dbe32020a094bdf2dc019e9e257f2f40d07b563
SHA256:094a94052376352fd2fad2cc666e6b52178842202f8147bc3596b5b78a7d0837
File Path: C:\Windows\System32\migwiz\UserSettingsBackup.BackupUnitProcessor.dll
MD5: b89b3be25b54dff9eeb686db8d500709
SHA1: 32dda5695991acbcbf01f31e1870996834ce2658
SHA256:424108e68b0f196f46d46cf217ba3711ecb309dcff3b6b1449ac211103c1bad4
File Path: C:\Windows\System32\UsoClient.exe
MD5: 13e72fce6ef1cf3f4508cf50fdb30ed8
SHA1: 7949b2148cc6644c1f6b20fd17a4b6329bfe0670
SHA256:31319d4828921f1ad81ea9b730c981f7eb13b2c79c0cfb363d7f51a13e9a87da
File Path: C:\Windows\System32\UtcDecoderHost.exe
MD5: c3cf9c0931bdcb78667a0072de71d33f
SHA1: a1510c618d560b3f32c669e312e878d4b176ca42
SHA256:12517ed37250f16da8d03c7c69ee3a3da7783f1c2e21bd8a5e2fccf92cbcea95
File Path: C:\Windows\System32\Utilman.exe
MD5: f9f518862e8d548ec98d9e27dab74a00
SHA1: 48207a11e5c24307018a3db9d316347a05fe0f40
SHA256:7d536447ffddbad5c9e99159087a6ebb7ca2324bc39ff80fd10e3e3106cc6849
File Path: C:\Windows\System32\UvcModel.dll
MD5: f537914147730c8be7cfc0fb01a1c11e
SHA1: 4bdd7b13e0cb0bb8847fbe29d5986ec005dd5fb9
SHA256:09e4cafb0cc34b89a5151c657cb9577970d45a51d90a966f865e53a5ae7be0fc
File Path: C:\Windows\System32\DriverStore\FileRepository\ntprint4.inf_amd64_1987ca3a0b344cfd\Amd64\V3HostingFilter.dll
MD5: 6363ccd5398b8291a8f2d368c38b9f24
SHA1: c813fa1d94971434fb01620c7735cfb99844dec6
SHA256:2625c6eb21da1cf29e2029db62262f3e0b4ac217b0c84e39bf2985f54ee08514
A CSRF issue was found in var/www/html/files.php in DanWin hosting through 2018-02-11 that allows arbitrary remote users to add/delete/modify any files in any hosting account.CWE-352 Cross-Site Request Forgery (CSRF)
Vulnerable Software & Versions:
File Path: C:\Windows\System32\VAN.dll
MD5: c66eb5ca6d8238ac26274b5973479aba
SHA1: 4953602e16c3ef6724351d0523583743368564a0
SHA256:06a71d96df0291b8d679204ae5b13db69d6a35fc4751090d9642bba4047cd1bb
File Path: C:\Windows\System32\VCardParser.dll
MD5: ef5a4f55aff1c16659c0a87a2fe135b6
SHA1: 98e9c04c05040505c495bc32b2f42cc982496e5a
SHA256:a37b7e1656d7184fd4629c69d7ebd95e5c81230e987207f658701ca1661fee31
File Path: C:\Windows\System32\VIDRESZR.DLL
MD5: f165c74d3a4ceb3e608407faefbe3fc1
SHA1: 31c1b31cbddbeb6860b37f5d493e45a80c1d3950
SHA256:e562837e2e581a7fe01fe4ba4120a688a2675817238215109bb10e8d8c30dd14
File Path: C:\Windows\System32\VPNv2CSP.dll
MD5: 514f648832f4dc06268297c12f5e5a9a
SHA1: ab985e9d2df1f87b31743b255e9492f4c7511d44
SHA256:0907986feac52556b3401db7cd69f6992b1f0d5a85da40ffea7321f9067a4462
File Path: C:\Windows\System32\VSCover140.dll
MD5: e2172e4f153d793e24d372e897964b0b
SHA1: 8df6687dcc5bf2a63a6c3e5348bb2998a018c029
SHA256:88b0f50777d706e106b8e24734c1751ba670922c30968b1a188c56df7b2509dd
File Path: C:\Windows\System32\VSD3DRefDebug.dll
MD5: 83a4af2aa9c0233d0f021f63d180d09f
SHA1: 976dd02b20433837a611de756986bc02ca9d98ff
SHA256:8c0ac189a6c7d64536d6525a134ddc2019e5b401445cba31a224c6a4b5d40b7a
File Path: C:\Windows\System32\VSD3DWARPDebug.dll
MD5: 9d470458d55b540bde0a13d3e175f453
SHA1: aa6f42c633cfaa96cb028b05aed0cb7e1e8ca1e9
SHA256:5eb9f264bc2187a116fc1bfc6cf796410ce7b4b256b8ca65ea2c235aebb44162
File Path: C:\Windows\System32\VSPerf140.dll
MD5: 452f44aaa9ed612fc775c4268bb55fd0
SHA1: cee27f686be564dc2bf26196406c0bb659b5e3eb
SHA256:6e3d09a6b6677370baf219a28a41c44e45814ecdf9ca6b132de134700a1301b3
File Path: C:\Windows\System32\VSPerf170.dll
MD5: 0c6ca0ea07569cdb99b8125549359a8c
SHA1: cbb569fa743655239343e11f5ce4fcd7e97c00db
SHA256:e8424d0f42e7dab207d7da08327ac6cecf05c22d038235e5f9eb94a60c1ef3c1
File Path: C:\Windows\System32\VSSVC.exe
MD5: 2018795ed86d9fe0a0554285c8be79aa
SHA1: f9cb6faefe69aeedc2d27933317c9da9b4c7b949
SHA256:2d43526b195918947f117aa203592ddf7413ceee6626f41dfaffe715eaf988ff
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\x64\VantageRpcClient.dll
MD5: 0df68eebf1c9607fee0456624f0f373f
SHA1: 592f6f975aa02ea06edd88d73e25496a8410f1db
SHA256:1c11216599ae878863c678d702715ecef6f957197b070220340c9d560f6d270e
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_fdde6ecd49c3a98b\x64\VantageRpcClient.dll
MD5: 1efac2624dd5797fdebba3fcbd176684
SHA1: 843a65ab76190579a75707574fba3f44554ddde5
SHA256:10b6aa75b30dc1c8c3e2649d92c0fcbb552104c3938d296c61ebf1a489f1b766
File Path: C:\Windows\System32\Vault.dll
MD5: 31d79a1303a6ef9c0ba98f0203d0c647
SHA1: c4baada58fda92549e63ab7649db18316cda8202
SHA256:6938a323050f23367475f2c136e1dee901fb1be66d11246dd3dfde765993ad8f
File Path: C:\Windows\System32\VaultCDS.dll
MD5: b36d13409709b21c64babbb1f9fcfb48
SHA1: 0c35e721288bddc5cd81bc39051aefb900013e43
SHA256:bf60bf38df1edc73a53789d56a52d658b599a5a2517e47c6e2e81f256c071866
File Path: C:\Windows\System32\VaultCmd.exe
MD5: 5f69f4f8683151a59c5a11265b4a3c96
SHA1: 95ae738ab6b2cc92d88e3debbaacdd924bc27f5e
SHA256:edc1b6a3e4fde216a323329e35f4192b0f49bc68285ee67036deff9e94c4e33a
File Path: C:\Windows\System32\VaultRoaming.dll
MD5: b4f8468c33f79eabe568253b143df04b
SHA1: 6d445604a258ce1edd4d9ce2dd1d30adaa5771b1
SHA256:c171e1c0f96c5dea69323e6908ffba491daf12bfef7bf7c9f19fb0e9edc48314
File Path: C:\Windows\System32\Dism\VhdProvider.dll
MD5: 23d18a2cfefd0e1af26d674e7aed1809
SHA1: 69788ac3b1f353a656f5d4831160dec2e88c974a
SHA256:b590306add5f24c65832d030bec10f7907624dbdea467c410398e5586e7065d5
File Path: C:\Windows\System32\VhfUm.dll
MD5: 1e630731afdfc63dec4074301d342e4b
SHA1: a8627a2ffffb03caaf49472bdd8cc3fc326d5dbf
SHA256:77083e571a830ee1be5b936505544e7dd538963a4106226ee514f5edf96dc4b9
File Path: C:\Windows\System32\VideoHandlers.dll
MD5: 404253b08847ceeb03d7749eedaff004
SHA1: 8c9253f03a053e86e5ac23fa9b4479ec54fc71b8
SHA256:27d403f79f0a25b70a68a02551f1d2210120385145f774d1f34c782f2ddc7cb3
File Path: C:\Windows\System32\PerceptionSimulation\VirtualCameraManager.dll
MD5: 2e5fc3283c3f9d7c819f00cbd79b7c8a
SHA1: e12f16054c5fc3ddcc4c8cedc471fb2dc809e626
SHA256:9250bfcebf640bf4a8c75bead5b4e2bff103b0e270a802c5e7d265f399875e6d
File Path: C:\Windows\System32\PerceptionSimulation\VirtualDisplayManager.ProxyStubs.dll
MD5: f5a62725dab0b453f221c5fbdddcd512
SHA1: c286ce385a4b140ff4f154cefc46c2c86451c601
SHA256:ab828ce8d89f378948e22203f276d0e0c961980430b83ef3a0f714bbae99ff2b
File Path: C:\Windows\System32\VirtualMonitorManager.dll
MD5: c8965a4a87d59ed8b5510f2bac970dc1
SHA1: aec04f366c4f1afb507391d49a0a74341abd2b89
SHA256:97aa3b0caead131433df697f892c11dac551becab77891f92e9752063032caa8
File Path: C:\Windows\System32\DriverStore\FileRepository\tpmvsc.inf_amd64_cb91328051de4e73\VirtualSmartcardReader.dll
MD5: fe00cc52a5b2968190195d74452547e6
SHA1: d747022414cd1637b404174ea280bd4bca300aae
SHA256:a51ff65f5d487d7eff88ed62dc2f5f7f86da9b35a6ee7aee28ff86fc3656197f
File Path: C:\Windows\System32\VmApplicationHealthMonitorProxy.dll
MD5: ddc2d8284d4d0ece96e0bf07f36b32c6
SHA1: 3f8f1b1bd8b7f680e8fd710dc9d6dddd622b106a
SHA256:48eb011e85b6c1104cb7e71c149e205febccc9a583ba8be046abab84bef76417
File Path: C:\Windows\System32\VmCrashDump.dll
MD5: 0ed7026026778f4ec030c0dd754bf40c
SHA1: 9c912179768b73e3e34103cd37e150d80cb88d1a
SHA256:605c83268c4809fdbe968adddbc64ca150c2066945d50b325311af78b0aea8c2
File Path: C:\Windows\System32\VmSynthNic.dll
MD5: 7156c70e0ad2b287cc3f190c36f2424b
SHA1: ae1b80ddd5303abdbea17a6aa62f6a79574ca8ce
SHA256:7223267f8d247e18e9a7552558ab7e5e6437bd4d328c76ad1712ec0cce381ed9
File Path: C:\Windows\System32\VocabRoamingHandler.dll
MD5: 04d7a7c7fcd169ac767e082effd8ea09
SHA1: 4757bf5cd89b2d9ccf964e2b6b8781acb9ee56c3
SHA256:4a53ca1f872b333b5c6a0310961f301650bc6405ee4e9a37652bc369e4b270f0
File Path: C:\Windows\System32\VoiceActivationManager.dll
MD5: 3a6feed8fa83e60e6ecb005c6d72ed6a
SHA1: ce169dcfe5756b866753e3f15e71f5bd59e45806
SHA256:e9e233c66773204701344c7e1d6bd4d71de302bb705c9b64f3c6f88a6d4cbad9
File Path: C:\Windows\System32\VoipRT.dll
MD5: cac47b9b5c39347e2566828885b856a6
SHA1: 9dff15cd8bf70a364c226bde30d1246bf5569439
SHA256:c1d08b0e8383a71bebcf673fb6ab6f9f4d23c02bd8f7e487223b70a76bdc7c60
File Path: C:\Windows\System32\VpnSohDesktop.dll
MD5: ce2027842704d7c05e74d1ecf92fefb2
SHA1: a2a652f66890d060e8aba21dedd42f4c7fecab98
SHA256:380b62840dc0d87a720b9f7b64ddfb640cbb82a6e532d77ad0449c9cb62036c9
File Path: C:\Windows\System32\VrdUmed.dll
MD5: 624a571b0f89f5416b9ad694d5be8233
SHA1: f3cc219fcaa16001b90bde4ed2c1ff1cfc1c2749
SHA256:f92318b3dd2c6a391ade80b9cdf885a72aa96a8b167141710140c767c9450ed1
File Path: C:\Windows\System32\VsGraphicsCapture.dll
MD5: 59bca04838a65394db3c89465a898a91
SHA1: 93a9579fde25d9b0e6ac522932f10b65d02cb9cd
SHA256:944c15dfc8dd1ff2d79154c146928f1885e1b9863d343279977a55de0571c35d
File Path: C:\Windows\System32\VsGraphicsDesktopEngine.exe
MD5: 12125533b3e59fe3e00c1f46a0d4c6d8
SHA1: 85d475c65ea364702a38b9174b5fbbdd076ce0da
SHA256:2c881eb9b2ad576272e2f9f69eb922a4ff3a7f35a3eac38bea3f0f51e6469de1
File Path: C:\Windows\System32\VsGraphicsExperiment.dll
MD5: b776e25bd51df982a762cc8249bf0dbf
SHA1: 7bf73f7acbf4ed5f5697db42b55eeda52066293d
SHA256:220a4988ea1dffb65c6dd45c2b7519858993e1838b60f962bd54aad24206f092
File Path: C:\Windows\System32\VsGraphicsHelper.dll
MD5: 339e31b984deb88721b9dd8a5aa43c89
SHA1: 2b31b4b39b092cfbd41e8d8e60e2f9130f042b2f
SHA256:7c680c90b2b68e00623689ee8fe9b86352fa7e52051ec63262b386f80e155b7f
File Path: C:\Windows\System32\VsGraphicsProxyStub.dll
MD5: 7992a61175340e49fb1a48db5c5eac0f
SHA1: 142b7db56a5a44a9d7103252d288dd44f1754750
SHA256:3e75f83acfa883b7378a0d6189fa1ded432b7e321538694179a69142739e1832
File Path: C:\Windows\System32\VsGraphicsRemoteEngine.exe
MD5: 538131649863221761c2911ec00fa923
SHA1: 833b050ef94091df4f2008cc36a6d2eac0b93034
SHA256:ad8883b0523077a271c66f74a847e6667b2064868b7c7cf03a50a3e2e86dcf7b
File Path: C:\Windows\System32\1028\VsGraphicsResources.dll
MD5: 5ae7537357ac4db24a1f39fe49776534
SHA1: b6254c708dffc21d30a8be337dd156113219f626
SHA256:91c8b9e0184cf2c26d7393525385ba7e396b3c7dc7bad883ca12d640a16ca8c3
File Path: C:\Windows\System32\VscMgrPS.dll
MD5: 03dac965248f5e680d896a1ab7fbd570
SHA1: d23fbf5a12283ee875b20528a7fffd4a5a26d11a
SHA256:144b95f481d5ead72f5d67afcb98925b9441ac29c5ea13c39ea2e2c917def39d
File Path: C:\Windows\System32\oobe\W32UIImg.dll
MD5: 97314d9ef9b92c4bd5ef61a89f6fd345
SHA1: 3dee3f7d7b9a537cb4d511bcad33faf2259ec32e
SHA256:9a34fef27efefbefb3e13e48abc404477c8dacdf7cc3b98afbc4ae27b443aeef
File Path: C:\Windows\System32\oobe\W32UIRes.dll
MD5: e86a0eb5a019d635ceacec4bec1b7048
SHA1: 44067ea9b43181d188924a7464203b0b7fe60408
SHA256:8b7f9fde94dca56a438bbd957cda94ddc84921f0fc337ebbc75a9f92ca7560c8
File Path: C:\Windows\System32\WABSyncProvider.dll
MD5: 25fc4001db8ee7f4a08977d8546b33ae
SHA1: 042059570ff80d112337cd3033c83f128de2908e
SHA256:106c658f80a3b4bdf065e1d72075fc737fc861a8514b7e162143b38cf9a3fa66
File Path: C:\Windows\System32\WFDSConMgr.dll
MD5: f25d3323bbf72c7bc79bdb2cd34361cd
SHA1: c43666d95d0cf36d4b1f2fa5e82378337c42053b
SHA256:a1c3a6e49ae423168f19cd5d66bbcfdb61cd4d5d55e5e20b5ff4d6bbae68b1e6
File Path: C:\Windows\System32\WFDSConMgrSvc.dll
MD5: ce1966980bfbebd9aeb5ffc28bc0c278
SHA1: 049dd13ea6032ec633326ed26d6abe008458b4cc
SHA256:3e5f33137da65318c4eb873929b78519631d0a3d42e0d19daf1781dfd185cfa7
File Path: C:\Windows\System32\WFS.exe
MD5: 0027ebe13c0814fdb0389d2a9182aa5a
SHA1: af8decb4d93c8b6a9c38781158b5cdcaecb5ed90
SHA256:c5e2440dd76b81b83a4e25b1b007f5005c37467f20ce5241b15a66d9a4a27a73
File Path: C:\Windows\System32\WFSR.dll
MD5: a97aed3e0fa88ba7314a995ea71250d6
SHA1: 2f8bbe591921299499c1ac063420b859be4fe01e
SHA256:8bc7590e78052d6e342a3c1be3a90b7dcbacd590153956c681457f3cb2e342a2
File Path: C:\Windows\System32\WINSRPC.DLL
MD5: fb7ff2c3ca14d4c1aa4ec717afb29adf
SHA1: 1379085b2298fcc7a495d7b521f6e44484f4d197
SHA256:f55a55a29542caf7aba026ff452fe4f9375a74c38714fc95ba696fe5d0b43761
File Path: C:\Windows\System32\WLanConn.dll
MD5: 0ba0cc89105a1f84f79f90bea86c0377
SHA1: d9089595a0b6a4bb1ebb571d38fb743d4463500c
SHA256:58927502508a567a375e3d5a689d127fad10dc822c6017dd4e8eff5c89dd29b0
File Path: C:\Windows\System32\WLanHC.dll
MD5: c6e0d5d5d1b590a37078279fcee616e9
SHA1: 753219d3f8f4afc473f95c38a92aac7501a1d444
SHA256:49646228137e99d27a9c10220d4683cae2d5643ab69ddcc45867fe497ba4b752
File Path: C:\Windows\System32\WMADMOD.DLL
MD5: 28ca31265b23be9303e5df2152c96526
SHA1: 3c3087b3994d4fcf17f5d2e1300aecef3188b108
SHA256:a113630979d3d2d9666d15e498523d7df832575fb407bb3183ffd4d611f5e6e9
File Path: C:\Windows\System32\WMADMOE.DLL
MD5: 4c8e5791c5218baabee3e8906b03bfb0
SHA1: b816875619adbe7583866fbe317f56199ae10090
SHA256:6a3c746f7c36d99c70298e2a46c3806f4700ab134525fa6a6c00c433b1bde123
File Path: C:\Windows\System32\WMALFXGFXDSP.dll
MD5: 8c59d6a230d2bc97e288f2805097406a
SHA1: 5ed0d82bee289e1bfd9b6c7bfcd4adac98c817d2
SHA256:cd87306837c633dbd6f8c4a0430aa595cb63c1aabf64444853c8384b02816e5b
File Path: C:\Windows\System32\WMASF.DLL
MD5: b25f435d7ec47efedf268f569c88e237
SHA1: 5a6b83a6f40c322ceea5c547b80bbda1fe3b97af
SHA256:0b4c4e457d5bba15934a7bcec6399563dc9e1d90a28bedce70bd6eac542bfd5c
File Path: C:\Windows\System32\wbem\WMIADAP.exe
MD5: 9a2d42258163720034a335cd1ac80110
SHA1: 35e4e40c6a68f424cd71dd2803fa196466fa1fbe
SHA256:1c646a86183feedc20e41b9df7263308e2936bdf690e421d64aab9ffcb0fa922
File Path: C:\Windows\System32\wbem\WMIC.exe
MD5: f04138fe0e6a4814bf3942e3037900f4
SHA1: bc2af7b06e6fa7cf10acc2686ea7e491a28dfb6d
SHA256:bf4fa71c1495f95adbcf3f7c7d41837e2661622c2ee3b24cd9647676047578da
File Path: C:\Windows\System32\wbem\WMICOOKR.dll
MD5: 6b08af75998fc24b781d737b60e9b434
SHA1: bc0e7e6bd054dc7fd98da0171bd1f86792dd6ad0
SHA256:1f9da0af0814850808cbe6acab7da2aeb45b1f5a5c9e04b99d5b9c20d4122b43
File Path: C:\Windows\System32\migration\WMIMigrationPlugin.dll
MD5: b896fe8edcd450035285a6be209068be
SHA1: 2c3ae68b57affdfc865c122564c7652d2235c671
SHA256:90e1bc42faf032720efa368e6706c3a68ac9c02063bc876922f4015a4767e0ad
File Path: C:\Windows\System32\migwiz\dlmanifests\Microsoft-Windows-WMI-Core\WMIMigrationPlugin.dll
MD5: 6101cd9da7ac2b993e6355b26f4847eb
SHA1: d63317643684c77a763f1071b5a368ff2468f565
SHA256:6290442c4b90b5653d5f807e4b8e66b701935a8343ebca6d5f106f17931a2a3f
File Path: C:\Windows\System32\wbem\WMIPICMP.dll
MD5: 9b774ccc90b34fefe3cbf44ba1386736
SHA1: b442027e4d626c2a2ee33db7d3dc2aae19bf455f
SHA256:d64b10b3e2e194d8912e157e5f27cbf08376a2cad6e19ef8863062276ef0e391
File Path: C:\Windows\System32\wbem\WMIPIPRT.dll
MD5: 91f8d6ca5853130494c15b3d3227c0c4
SHA1: 2c2d0e4b01dde7d68eabf144f5c3cc32db778cfb
SHA256:e90ad66df2fb8da3d7f16a0e3f0fdea9c0fec853a1b66a9b265a43cf1c1587bb
File Path: C:\Windows\System32\wbem\WMIPJOBJ.dll
MD5: 3078620fe465417a7c2f5d44d4a6fc42
SHA1: db2411e36df0be1f52f0b0f34e461c8534c5c1bd
SHA256:3b15c50364b4796f239933f4faccc6a5333a22f2c9cab7685f4537dcb56ec9c8
File Path: C:\Windows\System32\wbem\WMIPSESS.dll
MD5: 9be96954745d7c36a5726deb8ad28bde
SHA1: 8e44a8b9234d4e73f9d9fa1f414aa24648a9ee7e
SHA256:8300c2da596f5c1a416d02a598e323cdb4e82fc480e125df6fb3aa2c53cacfa2
File Path: C:\Windows\System32\wbem\WMIsvc.dll
MD5: 61f7ce2d4f7e44b73795878e4edb1963
SHA1: e5155b171ec2ed85a8e5433af80b2c722264c80c
SHA256:957e77dc780f168bca181681566cc62d348861512ea9c6d1740f3d3e8147fff4
File Path: C:\Windows\System32\WMNetMgr.dll
MD5: f2a1afa2ee5cf48a6bf431041aa9b631
SHA1: 5f50dccdf823f372a6eba562703ee6d9f3ffb70a
SHA256:2ba0d0a9500c180bf8a9cf24690f5c98abdaea577c5b04df0e50f0b0dc059653
File Path: C:\Windows\System32\WMPDMC.exe
MD5: 3b681378925143c9a2387df0d7b3f567
SHA1: 3cbadb7b8028bc1b0e2a2a7f68f14f4d471a37a0
SHA256:5589a2f7298239a501c7173d3ac5a8d5b14a82cb02b541d03a38bf377eef7401
File Path: C:\Windows\System32\WMPhoto.dll
MD5: b9dfb3bad590c9c9b3c553540b9d59e2
SHA1: 7e3c3a95164495f6d4facbb59e3cd036fffbf342
SHA256:8d9c29293396083679a59aba4081775745a255a2e612014d0e74fde330c68fc8
File Path: C:\Windows\System32\WMSPDMOD.DLL
MD5: b79e8a394d47d474d6853c33b5a4fe28
SHA1: b65714aa650301c485daa9af7e9ea91368db319d
SHA256:e11452c204d7999a4ae6aec8034e9a45830f643dc9c4a67a1c53869490d6aad7
File Path: C:\Windows\System32\WMSPDMOE.DLL
MD5: c30561728eb4d9af51c0967da828eecb
SHA1: e70bd622787f16fe833e159ab5c817b0a46c3107
SHA256:bdea6d2efa65444ba53e7b1f96da60b165c906619d0c44d2385e13c8676a53c7
File Path: C:\Windows\System32\WMVCORE.DLL
MD5: c3a06c95328dd4d49bf57e38bcbb66a2
SHA1: b2fd3acd0d97d35a9dd40d870561d8c6858f07c7
SHA256:c69358fc7cfc06721e7eaaf63a876a1b09f32f1470e432edaa7b0e813b6fdd8e
File Path: C:\Windows\System32\WMVDECOD.DLL
MD5: 0719d15433f325d0dfff6c0c0fc132b0
SHA1: 6a516e34b658cbed00b64200667b921d58ed55e9
SHA256:efb561ded7fe760b8e0c82d1cecfdd0e917c3df2b8a633b6b2befcb25da38aca
File Path: C:\Windows\System32\WMVENCOD.DLL
MD5: 708868c3becf07ac3189c8504ec4fcdc
SHA1: 220a19971f3a5b596c1c1add78ace680628c864d
SHA256:9d1e4c4b2231ac980c625bf4a74940458d8c541ea58ea24287a3992b7107312f
File Path: C:\Windows\System32\WMVSDECD.DLL
MD5: 82be419e6500ecc8455ae01ba89fd213
SHA1: cd595e350c5461dc308a2f1f2fda61c2eb7a7c8a
SHA256:2d8d5bf87162f0977de7f8c3140ea10942a4d528723978243afe08089023015b
File Path: C:\Windows\System32\WMVSENCD.DLL
MD5: 5959a00f5ba8b8fe56ada8b43051563e
SHA1: 537bd46a3c118ff2adb6fa5f6bcfd38ab29afff0
SHA256:48f13b453d7d8dea8f52e95d8af74e1780484e34f28addf0aba3dcb63a1094c7
File Path: C:\Windows\System32\WMVXENCD.DLL
MD5: 7b04adc41012bbeb3079149290714d4a
SHA1: 5a7ad86e105894e074cb4a62e9aeb557aabb8558
SHA256:8899d04f4882662783d13f8469aa4085fb77813c81e711c167c2a2d30dd29b1d
File Path: C:\Windows\System32\WPDShServiceObj.dll
MD5: 681f5610d931735d73d6a5f6d1696e57
SHA1: 8ed829f4f6a75b32f8c12ae0e6701fefcdb5f364
SHA256:f62b64bbdf1664a9556ad052f79083297aad4239564b717868be0f2cb9d707a7
File Path: C:\Windows\System32\WPDShextAutoplay.exe
MD5: 5d5df52c9259c266bae35c2dd1c24406
SHA1: 26c336b0d170ead4a0e25a91a595e086b23ef2aa
SHA256:3658c204e0f78927b0a7044261a54d49f67ae8865b0dc465529f202e75436acf
File Path: C:\Windows\System32\WPDSp.dll
MD5: 03db40d1e2e4acd3ea9233777dc22822
SHA1: 545402d3931592486970b59c7af38eec62c0c0e6
SHA256:bc634aabf84064690293a8e103ebdd473262b3081587f1efcfee5d67276f1021
File Path: C:\Windows\System32\WPTaskScheduler.dll
MD5: f07867114378bc4b01b87afd295c79d3
SHA1: ff297f7dd4650cbb26d911634d9e62397a9431af
SHA256:07832d23553702da2696b2b673a34e8a3385ef5a575af034c5125ce8eac2b798
File Path: C:\Windows\System32\WSClient.dll
MD5: aea4076b1a694539b63a8f662eadf065
SHA1: 577dcf666dd7d0f582f89398320b872ca1881532
SHA256:65ee192fbb82b41bb18eebd019929793fe150d6224c8107f5619dd1410359c6a
File Path: C:\Windows\System32\WSCollect.exe
MD5: 7e50b6a0b559996e98b5dbfbc3f0475a
SHA1: 533cbd81c455ccd00e05e9ffdfed329543536a36
SHA256:57d1d8d21dd536e457444ead63188c0468d42adb973b6a66a8be9ea68090a1af
File Path: C:\Windows\System32\WSDApi.dll
MD5: c7339106f8664638d49c1cb650e508c1
SHA1: 4cf0157a1a972d3d8e307d1b6e4f7043a91056c5
SHA256:6c6078f3757f1b8b9613322a8f2cbd58cf6c8249e4518847dcb7254946e08dd5
File Path: C:\Windows\System32\WSDPrintProxy.DLL
MD5: 3fe7380ececf94f990362318c3092777
SHA1: f46d6fb981fb51317a08fd78f0f1768b4aed25d1
SHA256:6913378c59dc587f9ea7b2f1526e3ccdd0081cb47b5c456b175ecf97494841ca
File Path: C:\Windows\System32\DriverStore\FileRepository\wsdscdrv.inf_amd64_91b1d3c9004ca424\WSDScDrv.dll
MD5: bc219fe86abbaceb50a579a9e74e5adc
SHA1: 5c8145003cd56e020228ed4906b06a7a08b8c67a
SHA256:235d1586845d8415643a41a7a393c091b78267453b592b257d3b96de124d9a1e
File Path: C:\Windows\System32\WSDScanProxy.dll
MD5: a8bc2a2a7c9c02e4b085263aa950ba67
SHA1: 89779fc0f7f3cd6c02590295ddf1906fb15e94b7
SHA256:99a74f04f9e16e8b69f2af018bbd3247edf799fa93dcb8731031b8d49b74e95b
File Path: C:\Windows\System32\WSHTCPIP.DLL
MD5: 0fa55cd481467a4b4beadf55ee9970dc
SHA1: 6d76a3bf67ff1b900dab7a21d1dd4a037f402f11
SHA256:d6b8d06c50f100a8586a1601652e2d7d2b9839b7af70915f46a9447b36509133
File Path: C:\Windows\System32\WSManHTTPConfig.exe
MD5: 252a26c2488c0f3570eec3b0362dd1a3
SHA1: 7112a13bac1ee6d54e4a39d45679d64e6b0307f5
SHA256:42b1fe5d3c19dc82455b8779eaa076c7e9a042bd52acaa4b33eb3728f0121cd8
File Path: C:\Windows\System32\WSManMigrationPlugin.dll
MD5: 60ce77d9bdd763dd05355d2d8fd2fe58
SHA1: c74c9da96b817e84ee648f8a69e88443d1129236
SHA256:8896a731b709d28640986d53cfa2096e55eebc047f4a2a445679540fd4ed5561
File Path: C:\Windows\System32\WSReset.exe
MD5: 88ae4c53af6d75d5cbf41e2afa030c82
SHA1: 7f2b4d82db4f1b2cb894dc4e1b6cbca3bc010774
SHA256:ef11c73bd7f7bfc277c663c855678f0706902e3ba49441cd51de178c16bb95ab
File Path: C:\Windows\System32\migration\WSearchMigPlugin.dll
MD5: b74eb945013d95409a3e071c4029cb02
SHA1: d087775c3f00e9c27842cc44bcb27c0f334a865b
SHA256:2bdbbd40df3b199cd8ebfc359be451971527e602ab999e23fae524f8edab0ef1
File Path: C:\Windows\System32\migwiz\replacementmanifests\WindowsSearchEngine\WSearchMigPlugin.dll
MD5: a3d6bb6f19082f30fa0ac4f775f11c07
SHA1: 0ba87d0fbfe577ea9038b057e6b1b3e9e346425c
SHA256:325acb953eb1a0ebb8bf3deeccfdb68aecffe996cf40ce3834d0e5c6d13a2143
File Path: C:\Windows\System32\WUDFCoinstaller.dll
MD5: 292099e35324f47e591fa08672ee16b3
SHA1: 4e38c16eac2e5119fdfa22f1462bc275fb91101e
SHA256:4bcf96af2cffee476d41dce90c07a4958f9f05a3029bcc2ed4b31cbf83a18b4f
File Path: C:\Windows\System32\WUDFCompanionHost.exe
MD5: 0f8667aa4ab415f00647962f10af90ee
SHA1: 11c5de514ce765953f17e32c5a31ce681ed3e474
SHA256:8de9e45a5104af65f41c1ccf549cadfe648f9c8aade521f35b6ba58dd40b8eb8
File Path: C:\Windows\System32\WUDFHost.exe
MD5: f39650983cfd01cbbc6158c6bf7fe522
SHA1: 88b212935d3f3bcb855317415abeb6d54b578855
SHA256:4afb76b497a7b1b37a9d597550827e829cabaf1f019b62a65a536d8f1832c90b
File Path: C:\Windows\System32\WUDFPlatform.dll
MD5: 539c98c490c3f9ba1cf5aa46520b00e0
SHA1: 2337cf126d4c9ae8f9c26860c5dd68eec4343dfe
SHA256:ee5d69ab8d5e542e38a4755e84b3abc99de061b96b09dd0c58f9bbd6e4db91a0
File Path: C:\Windows\System32\DriverStore\FileRepository\wudfusbcciddriver.inf_amd64_a084e687a06b255f\WUDFUsbccidDriver.dll
MD5: ccb1aa3f9297c5f8eb9da537188cf396
SHA1: 8ef5dabe04be17d6c890a145354a5b56719f0de7
SHA256:a88b6c98d7f8e43b126c8c23ca1198ee869b36b93190d6bf30f33dd4552047cb
File Path: C:\Windows\System32\WUDFx.dll
MD5: d759a3ece19d554d594eba73a14348f4
SHA1: 73b8e898c10dc2abd586cb40886a6d2074ca82fc
SHA256:8b3bcaa094f77761076c4ad42f63ed6414257136cdbd8dd83bc3f7a3d28e30d6
File Path: C:\Windows\System32\WUDFx02000.dll
MD5: 72984c9576dc0875860efb16c8e1fb7c
SHA1: 7cb613ac0d37ccb2c80491efe63f5058857d629f
SHA256:ab0799b8785489c48dc3213a8dc63520f4979568f37c4b63ed85a4b3c97cb6a6
File Path: C:\Windows\System32\WWAHost.exe
MD5: cbc39146d7884396601d40ccb55d9960
SHA1: bde556f1ea9951e21adfebddb39e2e9e5f78b5b2
SHA256:bce681ef43134ef33ec82b3236bf30eb0a7666a94007e56cac38a77a264fd29c
File Path: C:\Windows\System32\WWanAPI.dll
MD5: 449a63f9e0e7f3ebed98e2ad60dd1be2
SHA1: aafa9ef122fb704ffb3b2b9481965a14311fa1a5
SHA256:5d4fe5604cc47f2b0bae7fc1e472f64f3d5e418e5c4360bb3bde244c7d94a80c
File Path: C:\Windows\System32\WWanHC.dll
MD5: 5b42c0282a482799490fd2a0c1c2ea76
SHA1: 8d5320f9cf42a764a020082fd8de594062a0c9d0
SHA256:5e500c4fe076c4f45e9bfcb355b4edced60c60bbf9ce9e804a4614b6ba3d3638
File Path: C:\Windows\System32\WaaSAssessment.dll
MD5: 6f36f198caf0326e0111463b24e5b67d
SHA1: ed3c00868231f3b6eadf9fc9ef8c2e8fd9c46de6
SHA256:8bf9689c6ddaf023d6a5acd654c26d0489f8b4225edf6a743b61e95fd2c3aa04
File Path: C:\Windows\System32\WaaSMedicAgent.exe
MD5: f63c4515c58a728f7517156a8ad8b170
SHA1: 68b2eaaf8aaba1484b6e56a0434f0467f425b5cd
SHA256:1136903fc0a35ebadbec87092cd805b549c0e28a927ee28cc23f22367a9f6521
File Path: C:\Windows\System32\WaaSMedicCapsule.dll
MD5: 1f76cc5cb1d27cd101a22951637ff43e
SHA1: a4484c97ebba6720bdc8eefc2de0b4d5281eb878
SHA256:874e7942941da79a4a68fa89709ff7ddc90cde9fb66f2bca8ffdb37c92f5f156
File Path: C:\Windows\System32\WaaSMedicPS.dll
MD5: ada603a41a7c01bddc52d9279c9fb355
SHA1: f3a21272444b952507ce0b91b4b363d88fdb32d8
SHA256:5ce5fe5c1ca92d66dec9c299ae0e0eed2d993e6c1734ca699954332f94ba1a41
File Path: C:\Windows\System32\WaaSMedicSvc.dll
MD5: e503997a9a3f30e8a2fb6ac7b65e6be4
SHA1: a35b7046b53bd66d69474f7817d273e32544fce4
SHA256:6c0ed04161833493ecabc8e4920c0e21c24a27b0dfd3c010b2163fa952998141
File Path: C:\Windows\System32\WalletBackgroundServiceProxy.dll
MD5: b7d6a6bb752e0f3b336fe9f48f2bd17f
SHA1: b2c212468d9e4988a13ebf5b8397fc864e958d4a
SHA256:6aafa6d7ee7b50f43a1a74f518132ad1f9e0ca2c7c1c83cb0508e716a7eef276
File Path: C:\Windows\System32\WalletProxy.dll
MD5: 0ec2f54af7a73c0281e0b7ba5a40abcb
SHA1: 6d1b10fa5b1563307278b974de0a131452dd6641
SHA256:f80fcc0e391b6a9a881e1d44e7a4b521cb54134e32dde6e5b57d68da7c75a1e8
File Path: C:\Windows\System32\WalletService.dll
MD5: 9a5f7a6cb2c92fb49c1516aebd57f1d8
SHA1: ac16d1791f4e74b077c27cac2ed07e15cfb447d4
SHA256:2a33c6c97bb3bb0edf274a7728b18edc9254a15bd7fce9964fa4e2e09167b1ca
File Path: C:\Windows\System32\WallpaperHost.exe
MD5: 95ee6182b820614cc3cf65815acf7276
SHA1: 638cab9cc6341ec782bb7eb58172870ab9e7bd31
SHA256:f44462d6288338f3ce6559a487dcc9735a7cf168adcd9323e590bce13f2d14d8
File Path: C:\Windows\System32\WcnApi.dll
MD5: 7467b39c45daa67a17afc48c575dc75e
SHA1: 8d8c5f0a9204da68d7d63f28a1bcb0504359fc4f
SHA256:762b803175924a8880593491eceaab789512962f99232b35c7050b7f86a8ca20
File Path: C:\Windows\System32\WcnEapAuthProxy.dll
MD5: 92670a74fad8cd0f498222e69eb9b268
SHA1: bf2ac9a6460621e7abf776a02e5a5ea1cf9bfad6
SHA256:f81db2783ff798af265b6fa57007bc2c8b59b48820719575d1fd37ac0853cdab
File Path: C:\Windows\System32\WcnEapPeerProxy.dll
MD5: f6c69664b3256daf20a96f5720d0f320
SHA1: c4f54f4b5933fbc1a3d23e063888cecc0a3c4618
SHA256:4142522338e909d0e61d3089ced49d3b857079165a9a853145427e9b10b66519
File Path: C:\Windows\System32\WcnNetsh.dll
MD5: 04f1e5270992e03c079fa31b32fc2927
SHA1: f802955675c88c18a3d3b2e18eff3f82f5809069
SHA256:faae901145142d53a47a3ca8a14e71e909a250190bee606ec4e3c7e1fe5b25b5
File Path: C:\Windows\System32\wbem\WdacWmiProv.dll
MD5: dfa4d5b5c9def2509bec7e537f8818b5
SHA1: 9133f6ae0310b6fd26c3cf6159acba7cf23debca
SHA256:661594953e5eedbaff99080204865fa3fe68cc6293e8df355f8d96be59153dfb
File Path: C:\Windows\System32\WdfCoInstaller01005.dll
MD5: 6c00fbd924ebc5c3a59662165bc2cea5
SHA1: bbf6d00ff93c9781a4ebcfdd414b53c22a1dbac6
SHA256:181841aed878824863f61e096f26091e23a67284e40f5e0b5c24d96335761abf
File Path: C:\Windows\System32\DriverStore\FileRepository\usbblasterii.inf_amd64_90ea5fa9a796bbc7\x64\WdfCoInstaller01009.dll
MD5: 4da5da193e0e4f86f6f8fd43ef25329a
SHA1: 68a44d37ff535a2c454f2440e1429833a1c6d810
SHA256:18487b4ff94edccc98ed59d9fca662d4a1331c5f1e14df8db3093256dd9f1c3e
File Path: C:\Windows\System32\WebClnt.dll
MD5: ddf13bdbf439514e18fc049c9e4a040a
SHA1: be5bc79bedb17f09ce6661af769452ab745ddb37
SHA256:e6d907f038779e6f2d53981e6b5fd1091272c02dd3dcad3eb3d528ceeaf5445a
File Path: C:\Windows\System32\WebRuntimeManager.dll
MD5: eb0118f97cb1fb80d17c9168afc30222
SHA1: 84c7ce8492815f635b0bae9a5b49e089fbb0c895
SHA256:a1169da60dcf6a88672a4a80008ad2c7766e1beb784317938217160e53f38fd1
File Path: C:\Windows\System32\WebcamUi.dll
MD5: b85974df04fdfd29bb97ae03c6c54d2e
SHA1: 7196dd024e4191047ed9e21d9b1034647fc57952
SHA256:f416550d49c4eb45c23c96a28b603968fef647e5aa37db8594ff70996734c78b
File Path: C:\Windows\System32\Websocket.dll
MD5: 4008beeb593b646eac05272dae79d937
SHA1: 9d7d61b4ee1b01044387c88674f0ca7f8abd7a7e
SHA256:d5f1def7a1defd66b5a67c3804ef17e2156024b55a0d44504b111cc3c5202a5a
File Path: C:\Windows\System32\WerEnc.dll
MD5: 702c91f8781f4591d7e75a66a9b12f5a
SHA1: 2ce4a4e08bc237e0b7e905939cbb4ff8d3103ed2
SHA256:7afb756d35c574ea5c6f9f9206cbcc7d02997896fc9f1245314dcb1e9d47ddcc
File Path: C:\Windows\System32\WerFault.exe
MD5: 26c84a467b489a0e60f3720ae5b064dc
SHA1: 74a37701f7d4c9d899a857546c3410d650a72eb3
SHA256:9a0064029ce405645241c3eaba297f6c8a554e2e899ee7e3ddfa5341b5768475
File Path: C:\Windows\System32\WerFaultSecure.exe
MD5: bf9083ac41764f2257477ea210346867
SHA1: ce2832f748312e7523d85531eac8d94617d6e432
SHA256:e5f7c96683b32e9004c24cc25efb4c510a63592561a8c119566d276670004595
File Path: C:\Windows\System32\WfHC.dll
MD5: 3aee517d706add5f82f43f996c49ee8c
SHA1: 1851b9d0e3e5230cc6beafca401729760d4ee7d7
SHA256:ae7d7daa9b091bf25278e67c7d3170f44a67615ab2f7b95fd787b8fea496827f
File Path: C:\Windows\System32\WiFiCloudStore.dll
MD5: 58e7df8e896306ba81dcdb2513aa4ccc
SHA1: ee02e36a0a309715828d5da9e66fc03feea4e070
SHA256:eb7ee1088dbdab74200c5ac5f93046235bc02f4521a3ad120251e67b86cc31d0
File Path: C:\Windows\System32\WiFiConfigSP.dll
MD5: 10203993994fb607dcd1735ccc06273d
SHA1: f302d8e7cb762f3fd571e11f4cd5f384d3155793
SHA256:6ea97731ed98287c63f5a2e91043da2d97b471fc4bbf08b44108e2aae7b9cf52
File Path: C:\Windows\System32\WiFiDisplay.dll
MD5: 34f1d9e37a02840822150ad8358d150f
SHA1: 5f04d995c2050df523cd9a90bfea409dfbae3e60
SHA256:f18f5b5a7307fc2039172ded295b22b3045622348089b2c6a49c4f8c3349530c
File Path: C:\Windows\System32\WiaExtensionHost64.dll
MD5: 5d084613c0e5c8c3022d9e0f316b0e23
SHA1: 784dd38d9e553eb4b8955320fb596ae4e6854f23
SHA256:07bc4dc48d5d9bcc2ce52ca8a0f925ca021092dc34cb811e183cbc0d32e576ba
File Path: C:\Windows\System32\Dism\WimProvider.dll
MD5: 6b575817f53306c6fa8a088a699e1a93
SHA1: 24723f90d379c8559ec44dab464ad75b96e45855
SHA256:6a27deb8335dff86a36de29f339c50eb23b38e09c48072a93c105a75f7d43d97
File Path: C:\Windows\System32\Win32AppSettingsProvider.dll
MD5: f2444d9696a2411bad88593136b52461
SHA1: 3617c78d0a0f454472916f0910aa56eae383dc5d
SHA256:233e4e10e2ecfee6f95bcba87ed4bf56ca0fd9628598c3fc12640dae4ae64eff
File Path: C:\Windows\System32\Win32CompatibilityAppraiserCSP.dll
MD5: c99e58c9455ac24d2cf0c4d4fae07277
SHA1: 7abf1ce4f76a18f808888781fa9c55a33433eb72
SHA256:c0de63e9a409c1ef08d121ebd1c1e3f80b5d01afb04849bcb3aecb2b3991fa5a
File Path: C:\Windows\System32\Win32_DeviceGuard.dll
MD5: f9db719ccd3b6e48c339ba8bd7e0ef72
SHA1: 7b9484a8d26229f52a647ec1b3f885af6cac8f7c
SHA256:26af07cd78941c80f5aa7db091e21aeb230cbafc314d69e551ba3298858d8c39
File Path: C:\Windows\System32\wbem\Win32_EncryptableVolume.dll
MD5: c15d2e9b5b3fdaa3989b05539cac5a95
SHA1: 2af29f07a4aff41492b212b3cc761982c3aca8ac
SHA256:a25e5fcea0bf7bfdc4cd2ce65f212d52309715027e2a0bbb29aacaa68294e7b8
File Path: C:\Windows\System32\wbem\Win32_Tpm.dll
MD5: 18667d9051e93af509b0667d48c36ff4
SHA1: 194085b240c82b73dcabd6797618360b2d1c2545
SHA256:97c83c50cc8fb6654ecca2175f0b9f942b4c0b593964d6afee770a88baeacb9a
File Path: C:\Windows\System32\WinBioDataModel.dll
MD5: f50b1dda4e2b2ec6050615c8fe734a65
SHA1: 0dfb837d5b960399604fddd27409959e9699a5c0
SHA256:eea485591292447e9fe43ffdbb4e875785ff71d1eea74fc5a8c6d2f535c0b9ab
File Path: C:\Windows\System32\WinBioDataModelOOBE.exe
MD5: 92f705eb692d36c76faf4d55cdc69e35
SHA1: 199f2447bfb0f58640edd2dd84771c9a1ee6db8b
SHA256:9b2e9e3f89fc4d41ec7923ba17e74c91daa2b671c99d3e2736498e36da7313b5
File Path: C:\Windows\System32\WinFax.dll
MD5: 336929bd0adaf064558feffe20f4ba77
SHA1: 42217cc8571ad55863c818db942deef5aa47fe77
SHA256:e29180bc97dc4a17adb1299a008a65878b38cc21adf51be144efa6424b52d1d9
File Path: C:\Windows\System32\WinHvEmulation.dll
MD5: a12edd8bb17ce1093843f6265c895b2c
SHA1: 905ef965c1a81ed052e56044f36d4262ea5e2e3f
SHA256:2bf2bc2f2eb945d61c8628b80ffed462925f59f7483ce755b8157ca38815e179
File Path: C:\Windows\System32\WinHvPlatform.dll
MD5: 06a7b74527a5ef81860f8d71624cf2da
SHA1: e015452d3bd8f6281b7d2416d47502b83898ead8
SHA256:2f920f384b03082c8ab03e8c2295428a0a69d06eb3c774921c1da37edfac2429
File Path: C:\Windows\System32\oobe\WinLGDep.dll
MD5: 8cc2d8f5e95a48ab3b31d9060d711c6a
SHA1: 6323d30a09e65825aa8f3bf857a1d5531687dc42
SHA256:01dc670472fa3ff7f0f213a7e1022323dacdd33a4ca11b76f4c578b843efbb4a
File Path: C:\Windows\System32\wbem\WinMgmt.exe
MD5: 39e9c607da183984505a02dc7ac99ccd
SHA1: baa59c5445ff72640afacb38541a5a2e604dc767
SHA256:5f01cfea2e7e4e37dbf0e3300359d83cb08f0082aab2d22d0846d59d32bf4be2
File Path: C:\Windows\System32\wbem\WinMgmtR.dll
MD5: 880b708d4215397cfe959e40487181f2
SHA1: d4e3298de721ea02910dd08b9929fe5207a019bb
SHA256:64b77ad6630f710694774978e8d14daedd0fdb0cd5b38dc227d9b7b15ab6dcd3
File Path: C:\Windows\System32\WinMsoIrmProtector.dll
MD5: 710424671d336406b074196121733ee3
SHA1: fa6f31ad9cf89435ebeac66abb92a8b40cf9a97f
SHA256:9e3971a37af37947a26c54d8dd923ba82c18517018ccd2581c45214110dd5930
File Path: C:\Windows\System32\WinOpcIrmProtector.dll
MD5: 4c2237a85e21be42a263e719e154236e
SHA1: 0a4234c1cad3699fa043cf3c2adc01245ae73143
SHA256:90f10cad7edde344fb06dc147d0dee973efe0c295155c9bc19acef7657020f63
File Path: C:\Windows\System32\WinREAgent.dll
MD5: 248e2d3eed45799d5ea87280e325770d
SHA1: 32ec59271de113f40c288354700e1d469bc73d26
SHA256:53ceb7d0a7f280b745d84813300dfaf6a6468a35faa1c67cbebf237dc6fac523
File Path: C:\Windows\System32\WinRTNetMUAHostServer.exe
MD5: 9011d154703f4c9ecd61e616b16e7929
SHA1: 71a6cf79d741ed688fc2536f908bc7e5eccc11f1
SHA256:53674d426d4728fa7043a94cbce38b488f8e244ce4d2f011cfb9c580f5c0753f
File Path: C:\Windows\System32\WinRtTracing.dll
MD5: dae1deb1dbbce3eca0ee8750b9796db5
SHA1: 744a5ae1a0d76c703ad60ba633b42653ec4ad3d7
SHA256:e9feb8a8d16da2c00743e1e1c39c860a507ad8f53f420390ceef32827424bc6f
File Path: C:\Windows\System32\WinSAT.exe
MD5: ce04ab1d7cce6b62b6920751ee6e4656
SHA1: 35bbb01f3ef4358d20ad1876e1cfc09c79fd572b
SHA256:09641422179f119438a963579956ee836188181a199436fcf0896592ba68ae3e
File Path: C:\Windows\System32\WinSATAPI.dll
MD5: e6cbe48353b93e6615a47f0275eccc66
SHA1: dfe11e21e43492b72294f59470bb4bc072fd41bb
SHA256:7fc8ff89272186059389d5150f4699a010e024341d87b2d21319f38f2e7aae4d
File Path: C:\Windows\System32\WinSCard.dll
MD5: b063c8e6f68ee83299957d28048205bd
SHA1: a9ae897d896029ec31a1d12512fef247910676a9
SHA256:7323a597828f23134c76da80897d456710dcffa8cc52566f27d1cb209b5b2249
File Path: C:\Windows\System32\WinSetupUI.dll
MD5: 9e9312c2824733c86cea25fb85c564d7
SHA1: 573761e6c32212e0de992ee933f4e4d822f5021b
SHA256:a1e7b2f2af7ff5ff56f7ef5ac2d10c99046c5727cd78fdd6018f9f5e70742b5a
File Path: C:\Windows\System32\WinSync.dll
MD5: d756c60b69153de5ab7ddba6f0ace40d
SHA1: 856a8ab1b4b4dac5478d44bee35af3a7509d6668
SHA256:e5d3335e3c17d7e0da2a85dea0b1f8ec9ba3c98802e796154ddfb41d1f3bcfe2
File Path: C:\Windows\System32\WinSyncMetastore.dll
MD5: dca70d5da7b07a480dfb177c4bd3d505
SHA1: 1ad2b6e8d2fa7be0f00b2b1fb45032baa38c9ef8
SHA256:bb9da149013be354c865a8160140d4ba994a7e1b4c0affc14c1773251cbc32ff
File Path: C:\Windows\System32\WinSyncProviders.dll
MD5: 8e7e78995c85ae9cc5a8f0acb872e46a
SHA1: d9e40eaadbb97c11d4c880071259e6de4bb0cee9
SHA256:23cd83bc3a9b9db4b4b6130327dee3ef8ba5450f521bf5027d28aa3d85693768
File Path: C:\Windows\System32\WinTypes.dll
MD5: 45e5d7a43fb3f1334b560ec209012045
SHA1: 022bfd62059a4dbdf198faa68108c459760e22db
SHA256:f1990b9fe9c89718a15319ae78d2afcf7eccfbbd55799d18e589b2b320e4afd0
File Path: C:\Windows\System32\DriverStore\FileRepository\usbblasterii.inf_amd64_90ea5fa9a796bbc7\x64\WinUSBCoInstaller2.dll
MD5: 246900ce6474718730ecd4f873234cf5
SHA1: 0c84b56c82e4624824154d27926ded1c45f4b331
SHA256:981a17effddbc20377512ddaec9f22c2b7067e17a3e2a8ccf82bb7bb7b2420b6
File Path: C:\Windows\System32\WindowManagement.dll
MD5: e390594e9d8a409f0b2d80ff0c2518d8
SHA1: 653c6c5940e4d338e115a8b6ed573039f2f9a82f
SHA256:9d8b2dd0112aa18ebfa5e41a106e96809e7833052f487ba9a673c036b7d482a4
File Path: C:\Windows\System32\WindowManagementAPI.dll
MD5: b38cc43ec2e837500cf45bebbf05d136
SHA1: 38ecd85e0b30b2f4f4f99af4f1ccdd7ba5a96591
SHA256:79029563872873cb9b69767ddf9395b85c7d4fbe8230f25a7d35507dd47369f5
File Path: C:\Windows\System32\Windows.AI.MachineLearning.Preview.dll
MD5: 2bb788dd560b587065011ff02f3096a4
SHA1: 932c40cb8e3d835fc6eae669a5e4ec7100d073be
SHA256:ed682c4478026fe9ae974dcedfb599d070df343b004cfe647cd989e27677cffa
File Path: C:\Windows\System32\Windows.AI.MachineLearning.dll
MD5: 7aacd5cec1998e1a45a332387ad14abf
SHA1: 721f24e73765ef9e314df343287bb8aee72dbfed
SHA256:8b003352d78268a56773b5ae0ec487501fbfcb4f6bfd241c63ed7cb1c670a739
File Path: C:\Windows\System32\Windows.AccountsControl.dll
MD5: 2aa6cd76e919a203557a2a8b86fdd694
SHA1: 2fc3528143f926ef923711670985863438795a66
SHA256:707cad0ed007726ecb793885b5645a6b58b0ca2b8587d36176c2eac2225be21f
File Path: C:\Windows\System32\Windows.ApplicationModel.Background.SystemEventsBroker.dll
MD5: 2feb972f0ecfe1d896caeb48dab65898
SHA1: 5532b78a35f72894bba1d35be136f64b781df185
SHA256:ba4889bb1665188774d5971a1e3531585155132a9eeb5e31bb391db9c1136c8d
File Path: C:\Windows\System32\Windows.ApplicationModel.Background.TimeBroker.dll
MD5: 988c19558e89d0c5e03de2111cb2f1ac
SHA1: eee04ad3502e650c7787568f3903e30758cbff38
SHA256:f8aa5cc3fd43f16cfe9b02168fdec4a93c8057364798f38143b05b48548ca9f5
File Path: C:\Windows\System32\Windows.ApplicationModel.ConversationalAgent.dll
MD5: 1976fa3166ccfa81559c773e848e0388
SHA1: e076a472f24638e908fc6a09b58ea5509ba0b0d2
SHA256:f5592949dd3fbce2614a32def9f379a4d50f4cb454c8042759dc63206b392607
File Path: C:\Windows\System32\Windows.ApplicationModel.Core.dll
MD5: 2825d8c8ed8678db88f306fc9c238c00
SHA1: 19be36958dd469cb9b2c214bf0cb33236576482a
SHA256:e640a5ccd20dc12310f1fb48a3b7e0431789f724ffeeeceb9ba54834fb036057
File Path: C:\Windows\System32\Windows.ApplicationModel.LockScreen.dll
MD5: 039d95a68d2f90a05ab40074b057c709
SHA1: 763057c9b534b702b0423d1dabb632c3e6a3dcec
SHA256:9878e0e0254915cfec136b09800a1121ed224489fd36de8f2d6c7078d090b38d
File Path: C:\Windows\System32\Windows.ApplicationModel.Store.Preview.DOSettings.dll
MD5: 199403b431e670664b7ad8a116b97fa8
SHA1: 4a1c466c2fbfc0c976d61f977069d1d17145ad5c
SHA256:74fb9b994227f0aaf18651e45abe06097b69d50dfbdcba16e9b762bac33f5f33
File Path: C:\Windows\System32\Windows.ApplicationModel.Store.TestingFramework.dll
MD5: 8b57bf2e1a53d1fa12378c9a199cde04
SHA1: 7016b4dcff266643dd8957875cc160aa39d7ff7d
SHA256:6b778b915c5641f7d48ad3d5962efb766bedf55974acda9f5f2058d851d6e674
File Path: C:\Windows\System32\Windows.ApplicationModel.Store.dll
MD5: af390185b84b4964eab8ddc5b7773e09
SHA1: 8ad126c9d462271c0fb62e359a749912f60116a7
SHA256:3547609f6002af1b86f492b0458086040f136c478c24d6812c46da46ee4364c7
File Path: C:\Windows\System32\Windows.ApplicationModel.Wallet.dll
MD5: 025bf2b550df9d2cc223e55296112637
SHA1: 0d26bc746f073a35b9c0ee2d6a032f2bfd1f2992
SHA256:8b96c40b34502d88781666432bd650427421b27145cd9a754a568f12180bfe44
File Path: C:\Windows\System32\Windows.ApplicationModel.dll
MD5: 5f1f32b4f2de649f2565b9dd90f29627
SHA1: d8c0179f5005c64fa590904a04d7c089653b658c
SHA256:27369d0f034e8fa3e6859aa62cbe5e7fa7964a44b82467759e7c6a62dc9c309e
File Path: C:\Windows\System32\Windows.CloudStore.Schema.DesktopShell.dll
MD5: 619a905cc7edcf1382401f4122996a9b
SHA1: c1514ef0235e70dd03d3fbd884fa1c28628fe0bb
SHA256:7ac9a60658d1851980ca9fba7cf097409ed568cabe58d99a90a2615ba814ab55
File Path: C:\Windows\System32\Windows.CloudStore.Schema.Shell.dll
MD5: 45825760b4d553210c6da0689245353e
SHA1: 47030a8249d624601cdd599e0fec281708aed284
SHA256:baea7c97fdcfbffe5cd0c95328877338fa6c004027e3c4c955d29711e9b89fc7
File Path: C:\Windows\System32\Windows.CloudStore.dll
MD5: 59373266c2227bfe88ad30b28fdd17da
SHA1: 2ebb1678added1c6efd1aed175d418131916f942
SHA256:fafe69db18d78f344db9d8b031cf8c39da0e3d34b723730d9c8a3e909c6820d1
File Path: C:\Windows\System32\Windows.Cortana.Desktop.dll
MD5: 994620669569ff2e82fadbd057d8e3eb
SHA1: 8af14f82d4c81ba4a9f8340dc2f4f52666a69b26
SHA256:dcad9574c8cd9576609627672d84e336ebdf80e39134c8ddaf389ea57aca8e2f
File Path: C:\Windows\System32\Windows.Cortana.OneCore.dll
MD5: 02daa1e693060ebcfe7640014fd6fde8
SHA1: 4e124c14755310079b6324945bd393dfec496ea1
SHA256:13dff522527374212344eb78a1125f1c846347fbaf33928f0b4d0dfbaec3849e
File Path: C:\Windows\System32\Windows.Cortana.ProxyStub.dll
MD5: df512e441047f1734407d8111b733eb9
SHA1: 8f3aa3798050f8cf644df1a1e321955e62fe539e
SHA256:87d1dc7de7ec410085cd2c126862a365d43efbca9ece8c1b6861e84d8a6c10c3
File Path: C:\Windows\System32\Windows.Data.Activities.dll
MD5: 6e28ec1c7f5cf482f7c3b1ac045b87a1
SHA1: d8c126c24de47574e92c8ce853ec34994a1fe0f9
SHA256:114a4eb746c7a708582f7128a9c3947cb58fbf56cc4f22ca09d132fdceab976b
File Path: C:\Windows\System32\Windows.Data.Pdf.dll
MD5: 1840d09941b37d7693bb78d21d0dd8df
SHA1: 87ced0f3e5b990483029249e87a7443d7fb15d93
SHA256:0adf06c8cfc599654b352509fd4ca203e60261142f58cdb882958ea5154c4d85
File Path: C:\Windows\System32\Windows.Devices.AllJoyn.dll
MD5: 4e4b034927d9b60bb4829d401d52980d
SHA1: d89266c973c09eef4d4e00911ed7b6056eea3d94
SHA256:fc0bdb0c0fc975056ca3ebe11f98736809dd0ca820a47e36620284bc4e40dc88
File Path: C:\Windows\System32\Windows.Devices.Background.dll
MD5: f153889ba760ed51e1efc98d2c8d8125
SHA1: 06d8eb54a267d47d8b59c23d834b79930d8e2d10
SHA256:2850d7c84f7758edd686a7ed4a8afa8736485d458fb15c1d02620e6b6b240b4e
File Path: C:\Windows\System32\Windows.Devices.Background.ps.dll
MD5: 4f9f1e3274555d45273a4d5867a7efc2
SHA1: 79a7111c38941e2c051f5ee1667f1c53705b03ef
SHA256:25ddd2c0acd01e333a067e7aa61242fe94f4e5f9efe47b63faf2060e2b571919
File Path: C:\Windows\System32\Windows.Devices.Bluetooth.dll
MD5: 609c095a899131a98bb9de2cf78c5199
SHA1: d75ab8676653e982adc17b994f740e03c83e5d1d
SHA256:70f9c2a9f8f072a49ca6e9edd7c71aa9d581022c88b9b4bce684dfad49d667cb
File Path: C:\Windows\System32\Windows.Devices.Custom.dll
MD5: 743f89955eb6a8f1e2aace00087fdf44
SHA1: fccb320b5edfcdb3a1677d946151a90b49e0c891
SHA256:5f113c0cbdbd806481bac8384683c5774de39972cc655d23b3755bf0acb1f219
File Path: C:\Windows\System32\Windows.Devices.Custom.ps.dll
MD5: 09c69e4ccc8108a5b25025bbaaafeeda
SHA1: 6e60d11301231ef9f2548de63bf0dcdda7af7023
SHA256:a1eb2af34ee32e8b48190c715ac7f3ecec8ae47ea603216aeb1e071c6cecd22e
File Path: C:\Windows\System32\Windows.Devices.Enumeration.dll
MD5: 778722ac8501bc4ccae8eccf60df3f0f
SHA1: 8288fa1e4595ec672c79f2da4e2eab4e36ca4822
SHA256:e12e8379723578e65bd66211156a5b298ffa63ec93abd37baf80b00a3f530abd
File Path: C:\Windows\System32\Windows.Devices.Haptics.dll
MD5: 8d0c11655a64d6c8aa13748150adac3b
SHA1: 69abafaf815cac485599279b052ba53364470e59
SHA256:c0b9c1e5fc7e06ea97de156e2132a697eae7da8a4d5ec0db536e2bda3382e6d9
File Path: C:\Windows\System32\Windows.Devices.HumanInterfaceDevice.dll
MD5: d17023f110a0ae380e7d2d159382c771
SHA1: 072dbf370e623e50b3ed907fe605c90c25b94496
SHA256:2f1e9e00ff3db0fc7c6f9d07f7715bc8645e5941a4f511c7d7351ccdf722f62f
File Path: C:\Windows\System32\Windows.Devices.Lights.dll
MD5: b1a3e4f4c3bb118217250e30e7dacfba
SHA1: ffd0a0b4cddb911d946c2d33096e457a7e87781e
SHA256:fa3da9d8a301abde4ac79a95b00a3b5bca1143627af8021bad1692baa98242e6
File Path: C:\Windows\System32\Windows.Devices.LowLevel.dll
MD5: 973d6834ecfe52b80b6560e940175f05
SHA1: d2916ef93bfd8bec9bc573c5534f247be7883a72
SHA256:4197c1181b11bd3444633b3ebb5e65cb62cf5c91634b6bbae78a55966542e966
File Path: C:\Windows\System32\Windows.Devices.Midi.dll
MD5: e6467edf7e5a45baba6babf4f535992e
SHA1: eb74b962ea1e08550eedfcf54de69eec095b4c4f
SHA256:bac8592d800db5f880342f794ae4d6b6fe5db5fc50eb68523c7e829a3d37dfca
File Path: C:\Windows\System32\Windows.Devices.Perception.dll
MD5: 3a8b07132f57e9c3966a547019856537
SHA1: e632f04ad093c8b3050d6a571062fa6dc303e9be
SHA256:4e87524140ebc28b80bb4496f98006f838affe1efaf76981aeff3675f00a3621
File Path: C:\Windows\System32\Windows.Devices.Picker.dll
MD5: 7e99476ed897b1276740b0e33d548ad8
SHA1: c31fffcfbbd5f11fbca92e74c1201e4a12e29850
SHA256:9c21da3ada79e73c650e5fb14c3f1fc0446f9920e03029be4488ab9b6e2999c9
File Path: C:\Windows\System32\Windows.Devices.PointOfService.dll
MD5: afff5d51ed2ae2a2d3d7ee5915c1a65a
SHA1: 4c5872ff6d3d18bda0bcc1eeb574d255e131d878
SHA256:d1ce9694b3273aadd4b68e62c91487750817a147114f6c12e345ae5d5b4ecc70
File Path: C:\Windows\System32\Windows.Devices.Portable.dll
MD5: 7daab77bf6ea7a8d5f052a119dbbf7f0
SHA1: fedd511cceb11cc1f3bebbd5e2257f139c6e5d03
SHA256:a8eb6f8f0258c3a9226c9e95fe528610a17e2d988aff5743aafaa1758a480fae
File Path: C:\Windows\System32\Windows.Devices.Printers.Extensions.dll
MD5: ab4f496d9a1ac756d3557a9f8ebaf330
SHA1: bb1d9f650f3c8a7f8aa061379a2f1bfd99470714
SHA256:3d08b24ec375fe1d3eb1720748417142f7b35999317cb572989176247c8c4e2d
File Path: C:\Windows\System32\Windows.Devices.Printers.dll
MD5: 388d402d3ab2a3651d026c0e107a09b0
SHA1: 09234a7d4643280f79ea1776f44ea12487506f8c
SHA256:a3b2f8613563d864a8b15008df39d35a1c8936e685ae259d34961216438e3ce4
File Path: C:\Windows\System32\Windows.Devices.Radios.dll
MD5: e1db2440d4963fe3c9cc31d435cad0fb
SHA1: 9105d175a8d6f244fb62af4b1f4e096623f08763
SHA256:50165b002c9cb76fa78318364466857c9569b95f30f72be21aff44633c36c59c
File Path: C:\Windows\System32\Windows.Devices.Scanners.dll
MD5: 20c94633fc0a280fa7685a52dff41539
SHA1: 132936b1739426f5960be07a3d1d11c40ad5d9ba
SHA256:7663c742f99bd8f3bb1137a485c118b5d544bba0d97a66c9d6df3d8e8c7e6924
File Path: C:\Windows\System32\Windows.Devices.Sensors.dll
MD5: 1290bcaf133fab8a681cea3ba60fcdae
SHA1: cb87cab92f46633e156548b80f8c8534481dbae3
SHA256:1bfa6a2d05647438a1099fa333b643ca085d4388a871e1373c9cfeaa28143a5e
File Path: C:\Windows\System32\Windows.Devices.SerialCommunication.dll
MD5: c5e30770adf4d80a21a773d018b47d1f
SHA1: e2f278436813a4a3583db0f984dc8eb78a53b53e
SHA256:edfb7da6c17ef26c1fad62d55d3eb3442eb1c727c441a9a04d0c6c4e10520d6b
File Path: C:\Windows\System32\Windows.Devices.SmartCards.Phone.dll
MD5: a3853cd3491d9021adbf799478afdaac
SHA1: f36536b4aca3cf436f7947c3fa11026f66310fb3
SHA256:9872b17db801235183bdda9bc7a0d4ec6889b1ffc869d502e0fa63473b23b265
File Path: C:\Windows\System32\Windows.Devices.SmartCards.dll
MD5: 8e8f09d21db10133a528c592e89b390a
SHA1: 0033e9f0a5b59375904e9a381b82c718b28bce60
SHA256:259d0c0ddb64b462e7ef82b9376267dc0d697df8392bf9643c1b77adb70c01e7
File Path: C:\Windows\System32\Windows.Devices.Usb.dll
MD5: 5404fd030642ffc876b9963941448778
SHA1: 03e40190e3ae5c8455e8cc006a2615721e3d65aa
SHA256:bc32e58dc2f2e04f01beeb74225e11799882fbffc749c95916346d1bac2b04c5
File Path: C:\Windows\System32\Windows.Devices.WiFi.dll
MD5: 12d30617d3939167fa6e3360191505f3
SHA1: 911b6dd26498f98a7ec6f5efb263d70c0693c00e
SHA256:a98d8b058a224ef6892411e0d5b04cd476aa992e76d84f2f6ae129938d6d67cd
File Path: C:\Windows\System32\Windows.Devices.WiFiDirect.dll
MD5: 737ac6fcb4c01686aba6b589affae827
SHA1: c5435074911c630da6835649aee55355bb464a03
SHA256:8e67566e878e967af5e131d3a1513e8fc0a709ac0eea246ac70b05b99c31fb11
File Path: C:\Windows\System32\Windows.Energy.dll
MD5: 2bc0e2c8977be07f5996e18714c0fdd2
SHA1: 24ae1244926d4296a21b859148f837c4fee97ca2
SHA256:102f87bb430ab189f5511e817a80791e53ed72d376663ad462771f5c6eb510c8
File Path: C:\Windows\System32\Windows.FileExplorer.Common.dll
MD5: 139d1cc261f831ef412e279d7aba3204
SHA1: e1fa918c282086113767ce4bcdee53d01fd96daf
SHA256:20976cde7b8c6d6dc9d21b864aec976de70eddfe08ddc34e6aefad7016fc5bc9
File Path: C:\Windows\System32\Windows.Gaming.Input.dll
MD5: fbe0cfbda685e50b18707c9a9a2de00f
SHA1: 8a6f0eebdee274f2788c51836697e4503d875c78
SHA256:cc05a51251bf8770a33d56a95a7ba13f7579a67727d71d093ad743ad40eadd66
File Path: C:\Windows\System32\Windows.Gaming.Preview.dll
MD5: 40653f09049e7fe8a102841141e866db
SHA1: 1279e887f2bdd675ffc83bd75abdbf42a860d304
SHA256:96637726987b05719d525f133450500cb53522a694667791b58dd32d799b3afb
File Path: C:\Windows\System32\Windows.Gaming.UI.GameBar.dll
MD5: 73ee81168ea8482ae4daae7d9f9caec1
SHA1: 1bb818dd72bdc04490feabffc1cc154b9e1f3825
SHA256:865ed58ff20555855016db94064139cecda52ab4573e92028efe52a96bebeb10
File Path: C:\Windows\System32\Windows.Gaming.XboxLive.Storage.dll
MD5: 06ef3954571250c3432f95f510e29257
SHA1: 3bdb29eb8e2cab7743b33d36b2683b170ef0fc68
SHA256:3f40b8d34270c71c66a152ead916bc3d11e4a711ac2ea73aad2ea84285d321a1
File Path: C:\Windows\System32\Windows.Globalization.Fontgroups.dll
MD5: 612c97b7a0964c09b2e74c96adaff010
SHA1: 5bdf604064de995e8a9423a677877da306d5a6fb
SHA256:8e2929829005879b94635a14baf25ac3d8929f8a9ffd6cbc13d0a84b2ced6565
File Path: C:\Windows\System32\InputMethod\JPN\Windows.Globalization.JapanesePhoneme.dll
MD5: b8f955346505aec0f5806091e134457c
SHA1: e9a17741ee6051f1dbdff0a51be2828a55f0dc9f
SHA256:33c860220d5674e9e04965c74bdffaa84e82817c8e2d649e4ddd052181337273
File Path: C:\Windows\System32\Windows.Globalization.PhoneNumberFormatting.dll
MD5: 1781ece326b28635af14a6126f8bf10c
SHA1: 7f818c46b81e5f816052c7b2907cff257296a712
SHA256:5bb31d3305411b54ecdf05b36d233046d56c36eade577264a5243224559b33dd
File Path: C:\Windows\System32\Windows.Globalization.dll
MD5: 9ec04b28ef58e005ca9f9591e0af84bb
SHA1: 26c89cbd67e7779fd1689eb868e681db8d63005b
SHA256:178e53ba7b38b972d80a3dd26011e9fa6937e9e2ba3a51591ebe75736c3b0054
File Path: C:\Windows\System32\Windows.Graphics.Display.BrightnessOverride.dll
MD5: bef1b619f0f7d6bef44b174f29469ee5
SHA1: 1c7ec652a7f12a8f538b12e6d687f1085de0d9cf
SHA256:f63ee1fedc1baaf0630fd9e42a279b9ff9bcf0a32507fd30a0d4bc9b581365cc
File Path: C:\Windows\System32\Windows.Graphics.Display.DisplayEnhancementOverride.dll
MD5: 7b7f04354f2124beb9dfe75eb072a70a
SHA1: 66f1896e1d791809d6fc7609c1866d358e18b463
SHA256:4e51665db26f1e95a15787bc7b339d2532ab14b5ea8f786ee3ff5354c35b1a60
File Path: C:\Windows\System32\Windows.Graphics.Printing.3D.dll
MD5: 3f55422463c0dabe9e43d2733a26a4d6
SHA1: cff3d11bea82fef846c17ddd4748723685209432
SHA256:9f8378f588fc712074b1296c2760a18f1000e0625656111704125be6163558b1
File Path: C:\Windows\System32\Windows.Graphics.Printing.Workflow.Native.dll
MD5: 3037620a30fe1dcedfb1f21c3259db9b
SHA1: 7055013123d8e18b1f398fc369198e022d8ade3f
SHA256:f4bf6f1ef211ab69489cf5e25b09e350be09a7ea9ff10417002bce466ef1fb92
File Path: C:\Windows\System32\Windows.Graphics.Printing.Workflow.dll
MD5: 7f1d2221d46b858d3ce4c58b0140560a
SHA1: 6840c07f93ed498cbbefd27fcf2019d021d16467
SHA256:410372325c1043f3e2f10ebe45567f3697f89c60b815dcf0da48ba6fe20d1050
File Path: C:\Windows\System32\Windows.Graphics.Printing.dll
MD5: 112006c445967679f1d1898d1776614f
SHA1: 80f0c4f7c4f2129d1f70570e87a70961a27f60ae
SHA256:fce92f33885263ed1d6541a625dff3e4ea765eb8bf9c0334e5e97e0c3e050aad
File Path: C:\Windows\System32\Windows.Graphics.dll
MD5: 0f4e4dccf7001caa4e420ca1ac517a76
SHA1: 614e980a5914c97c802ff2eca6bf4eb45309bac5
SHA256:f0890c5d151dd2211ba680d405f62b417a8a8948691b3e0ad20b4580473550ac
File Path: C:\Windows\System32\Windows.Help.Runtime.dll
MD5: 269804d62fc1e6c2f3de9351849afebd
SHA1: 04724d3cde87057d873ff0db93d52da5e1c85b3e
SHA256:f1bd89b047fb2c11c43a3b59aae40a511325c3568ea2114c590483fa8d9af9c4
Buffer overflow in Winhlp32.exe allows remote attackers to execute arbitrary code via an HTML document that calls the HTML Help ActiveX control (HHCtrl.ocx) with a long pathname in the Item parameter.NVD-CWE-Other
Vulnerable Software & Versions:
File Path: C:\Windows\System32\Windows.Internal.AdaptiveCards.XamlCardRenderer.dll
MD5: 34697fbfc7ea6841a0f98600d51f09b7
SHA1: 0e4572b2f10cf806368125aa7928d5576f8883aa
SHA256:9f7bd10df5c9db1a66025a6a6409ad243860025fad478b0f5500644d02960311
File Path: C:\Windows\System32\Windows.Internal.Bluetooth.dll
MD5: 892761230094c912c4324b08e9e03b06
SHA1: 7ea5f7596422dd28064e99716a58e9444cb42554
SHA256:ab1fff7471b2985e641b1b867f8037440b087686b021f08277423ec01d052d5d
File Path: C:\Windows\System32\Windows.Internal.CapturePicker.Desktop.dll
MD5: 9c3c784028b044c44a0aafb9f7c885da
SHA1: 96fb8efa2447b5c08f5171b35714bbac7d4e3628
SHA256:167b7ddf52b6e69d8cab289c09a46cfbf7dc51bc0842d85b0c6f3986214dc528
File Path: C:\Windows\System32\Windows.Internal.CapturePicker.dll
MD5: 1e163b18a7e68f50c9a89d5b867165cb
SHA1: e8cee41780a138510ca7e04020b1dde799682f5f
SHA256:21789609786344b58e23e1d9ee89e27355d3eeb2d2938bf383950c86e1381df8
File Path: C:\Windows\System32\Windows.Internal.Devices.Sensors.dll
MD5: d37a709c3c352ce901eeaf2ba1356e1e
SHA1: f960870da230dd9c57368d85203ae7ea181fb680
SHA256:9d01d46ce34ce8d246ae07af07d3c1b738dfcd89fa2670616cab8c87f62cafac
File Path: C:\Windows\System32\Windows.Internal.Feedback.Analog.ProxyStub.dll
MD5: 2e96d52e9274ffe9eb909b5d242bc1a8
SHA1: e40531e7bab78272c93458f508db19422261945f
SHA256:e40912e33aa4f4e721aeb62719218be878a3e930f2f3064403c3a4c7186feba7
File Path: C:\Windows\System32\Windows.Internal.Feedback.Analog.dll
MD5: 35207d079a0cc0d7cdfb36d04fffbd33
SHA1: 0e1685455d9abd4779ad6d1cb3f8cb4e0b2b8d06
SHA256:a4a2b3eb82a694a1dfd85f726c0737674e792ebe30b2f633a9208fc024bf0a99
File Path: C:\Windows\System32\Windows.Internal.Graphics.Display.DisplayColorManagement.dll
MD5: 20d60b281bf1a2a45fc52d616da4f3df
SHA1: 207ed208ba73690d083b4ce8d445901ac4e66fe6
SHA256:026580630c958348ece40815977574732e46973dc016690cba1717759edd6b14
File Path: C:\Windows\System32\Windows.Internal.Graphics.Display.DisplayEnhancementManagement.dll
MD5: 0d4dd7d3bea6a5294155ee6ade084900
SHA1: 7cf581e8b629c3ace79689b40f98eb89640cc5bc
SHA256:b1abe6348e30231efb72924c7b0749a3bf6a9d7b8118f3197e3ae7180e4450ad
File Path: C:\Windows\System32\Windows.Internal.Management.SecureAssessment.dll
MD5: fe026d7101d7212e501258854ef5ad8b
SHA1: 636a7758083181f983093dfd2720465ee2683bc0
SHA256:9d177c18f44619af049b71eaa1b9347380dcdbe033bc15eddd77b9ea45077f27
File Path: C:\Windows\System32\Windows.Internal.Management.dll
MD5: bb180fb00a2522620e407b121f7ec88f
SHA1: c0fa6dddf7d6c8811a1e70b17de1f00c85d96cd0
SHA256:14772de3c3b5277c509ba94db832afe66284504f214143fef210d9e99d358227
File Path: C:\Windows\System32\Windows.Internal.PlatformExtension.DevicePickerExperience.dll
MD5: ea1261dc7bf36cafb9d663d858ca3f89
SHA1: ef0ed31e4c0d48d9e13ab3f43f2ce6cae106cc98
SHA256:f48a39e2336c6e032289c15bb054720f6741f8cb1541ec343b014a607b13c0e5
File Path: C:\Windows\System32\Windows.Internal.PlatformExtension.MiracastBannerExperience.dll
MD5: 44ca1a1d92ca54f8660596f748ca7102
SHA1: dcfa9364c726c6f16cbf2ac5127b928483b7b2a4
SHA256:afa2cb562974658c7bb9ba7c10143a286b08028493a6e2a1e985d3686f8b3c98
File Path: C:\Windows\System32\Windows.Internal.PredictionUnit.dll
MD5: 5626aa5d44c531bf55d76ff8f7adf1dc
SHA1: b97ae651cf0bf356abe80642b468a74937bc63e8
SHA256:612c74361ce9085a9050597000805b9c1513b2802b96cb3774f4b60600d290ee
File Path: C:\Windows\System32\Windows.Internal.Security.Attestation.DeviceAttestation.dll
MD5: 2b543891922effc83039c6affb4e42e7
SHA1: 8a0669544f64656fe96d3f75d1ff48e90b3990d2
SHA256:b004026405599d531957b80ae8d37c7fae672e72b59e884ad484e8fc308132f7
File Path: C:\Windows\System32\Windows.Internal.SecurityMitigationsBroker.dll
MD5: bdcce59583da93cce710c418bbd2b7f2
SHA1: 3bf8861725a8cf1445348b1ccc72d492f80458d5
SHA256:171b6b50c24af858434d49165c4d359cbff3ffb4dca3abab2078d362ce3694b6
File Path: C:\Windows\System32\Windows.Internal.Shell.Broker.dll
MD5: 1a41c6750e68f8794a57077cdf48f824
SHA1: b0d3ae1c3bf39b9f9387fca3cb571399fa8a68e7
SHA256:b6dcda5ea719cd4d35216a2e04ec7b1ef91e09fbd55b83ef7d499a4a4dfc3169
File Path: C:\Windows\System32\Windows.Internal.ShellCommon.Broker.dll
MD5: 87bb4499fadbc0343790fe818fbe4f1a
SHA1: 5660346c7bcaac76ca969c31d13ea69017b5601f
SHA256:5c18e952a50bb9824b674245e2a91beed65a6375604454860c601622789e01a9
File Path: C:\Windows\System32\Windows.Internal.ShellCommon.PrintExperience.dll
MD5: 5ead5cf51a0a818a9b1369c01fe205fc
SHA1: 7d08c488eba544ac3a25eead3fddda3ef919cf9f
SHA256:a2ec4dec5819edae12ac09b2522b550911c606fdbedeb4c8826475fc7a3f10c2
File Path: C:\Windows\System32\Windows.Internal.Signals.dll
MD5: 012ad5850f4f8ea52784cbc291616871
SHA1: 9e4e695ce3ee5525efbef84edc8972288b1b7e80
SHA256:97f35ccc940a33e50d8b88b229d86ddf2a1e893bf2bf91059d28048f457c2171
File Path: C:\Windows\System32\Windows.Internal.System.UserProfile.dll
MD5: a512e41f0f2bf1ffffd1b34b47a5cae3
SHA1: 16d0474e065eb5a669e6fe870274099049fb7b6c
SHA256:1f4b7cb2f555a7ff1c6f63600bf5e5b2c0b526382b4961d1cb4cf8dba21f5066
File Path: C:\Windows\System32\Windows.Internal.Taskbar.dll
MD5: d8d4df77a7d2307974605a7ffd5ce26d
SHA1: c1ec22f880a6444715baa36efcf158e2f308fa1d
SHA256:3606ea03221ca4b9f634e7dc0d04fb14d60b798e79901838f14c0467a0abf839
File Path: C:\Windows\System32\Windows.Internal.UI.BioEnrollment.ProxyStub.dll
MD5: eaf28a3137154146f6771fcb0350b138
SHA1: c87602dd92794090e7462fde634eb82d71025b7a
SHA256:cdaddb1c58eca32c353f65825cef1d278acb69325be68c743966201ca0b34cbc
File Path: C:\Windows\System32\Windows.Internal.UI.Logon.ProxyStub.dll
MD5: 692d643a9dc76fb1b544db2454550a23
SHA1: 835dec228e70be29c839b1452b34a8615448dbed
SHA256:35f5a2797ffc8b466b97eab528ec45055cb186158057ecce785257fc63881b1a
File Path: C:\Windows\System32\Windows.Internal.UI.Shell.WindowTabManager.dll
MD5: cf621c91d345bccd32943c76475863b3
SHA1: a1182878875ac69b3fac267e118e3686db9d62f8
SHA256:193f6cad5064f3eaf72b30416111a5e43c22d8e3e1dcecf31649f68cb7520c19
File Path: C:\Windows\System32\Windows.Management.EnrollmentStatusTracking.ConfigProvider.dll
MD5: 17becaf88ed3a44e0f194220dfa95d93
SHA1: 9a7c50cff17db7430051d79db5e387c53538ced6
SHA256:6de0049b20dcd678a2971721bfe91b7d31f313667e75556cc6c68eeece57517a
File Path: C:\Windows\System32\Windows.Management.InprocObjects.dll
MD5: 5db0c0d34e04b23eeae78caf73022709
SHA1: 52235c71bf9a5eff5f2860b88a22e2e32f1469cd
SHA256:f72366833ec70a5db3794bb059d18908330947077206a00700fb419b21173a7a
File Path: C:\Windows\System32\Windows.Management.ModernDeployment.ConfigProviders.dll
MD5: f4a29be2c57e2e2d7c6fa8086b6351dc
SHA1: 9870e3ab783e78ba9934c159b50b6fec898b1279
SHA256:4393df3319043a17e46dd4b6d237277a96766fdc92501cf6ef7ce284cea4144f
File Path: C:\Windows\System32\Windows.Management.Provisioning.ProxyStub.dll
MD5: e60171078bec2e3d2b9ee93fbb3c6715
SHA1: c690a26dca25c4af49b3bd971e6c1b67bb550185
SHA256:1da429ed76cbc6760fe278a8d9d22dae7a6fe9674fedb72ca52482915974aac4
File Path: C:\Windows\System32\Windows.Management.SecureAssessment.CfgProvider.dll
MD5: 400e30996c5965d1e78f6e9db327981a
SHA1: 78630b59a3b2c116bb76429ca6a7b6bf3c49f46c
SHA256:7e94ab2d3836feaa05d2e06c31bb77e9132f865075eaa552cac2619b3a16ca9c
File Path: C:\Windows\System32\Windows.Management.SecureAssessment.Diagnostics.dll
MD5: 9ee369c0e0941f20869f7646169f6ab6
SHA1: cbc91e1373383306b11e5d69861f7023bd54c7d1
SHA256:e536ea7ef35d45aff700a67ac6d73dcc95bf7fefcd45f90d0016c9afd4ef976e
File Path: C:\Windows\System32\Windows.Management.Service.dll
MD5: fdbf4557a26a7988fb9cbab458b5dd26
SHA1: 93c2a9794f39ecda8e38693c452a70af5a4a353b
SHA256:8c12295444b32211537683039706e01c7eb8028a0d2b1e06903b4536cb76c7b2
File Path: C:\Windows\System32\Windows.Management.Workplace.WorkplaceSettings.dll
MD5: abeaa649bd3d8b9e04a3678b86d13b6b
SHA1: efed16003c27cd4ccc60dc27db74bd36d2fe68a2
SHA256:88be4ee843219077ca20153a53aa22f7903bad855267c1893b5b2a51f6ab8da7
File Path: C:\Windows\System32\Windows.Management.Workplace.dll
MD5: 14b1ddfa050c56888666e43253d069e1
SHA1: d4d206d33ac55b07d5c06c4be65bdb347044f690
SHA256:082597976386ff8a8ea65d2ed7bddc8fb643ee6c42acd02f89f38db4db2737fa
File Path: C:\Windows\System32\Windows.Media.Audio.dll
MD5: 51df4c4765dc8099a51210db62709e71
SHA1: 1c2239e92f042c2062808b2ca07accb6dad54f16
SHA256:fbbf6f9e2265b5676de849d739b1402c49ac71566ba511ed3650caf2a6123471
File Path: C:\Windows\System32\Windows.Media.BackgroundMediaPlayback.dll
MD5: 05fc35c50f21983cb5487bf245775fbd
SHA1: 58a86f698f632bc688cffaabeead09db175dde17
SHA256:a8c71b20e3964f7bbeb0cb926c259ac808a2264bf274a180961ad789019a9ba8
File Path: C:\Windows\System32\Windows.Media.BackgroundPlayback.exe
MD5: d264c355b7e8855eca8011d6152437fa
SHA1: ad95974ad635df89ff5da118c2fd8c2742cb5e21
SHA256:511051289e3fb3a06639d7d43aee8104e53c42dbb7a8efc79404b8d7bb6b8966
File Path: C:\Windows\System32\Windows.Media.Devices.dll
MD5: 029c57ef641e614a3e565b839e1ad47d
SHA1: afda730815f6415d670621941d33b17e0406d135
SHA256:6c923fcb1c97e1338e3e22edacc530810c26615b262de1ac02c67f03ee849747
File Path: C:\Windows\System32\Windows.Media.Editing.dll
MD5: a7b95fe897dd1e6ec763c78806a1ede1
SHA1: 1cf9f73849fa0b2563b4e07a572394a160024ee8
SHA256:f6d01759aba1f0bbe9fefeb29bab7c2b658028a9a2b31cf1dd18cce44989f662
File Path: C:\Windows\System32\Windows.Media.FaceAnalysis.dll
MD5: 949e00b4aacccf9b83510af774b04abc
SHA1: 13e7612b215abd403e9901e5c44f58874ff9ed55
SHA256:abed34c4c7033bc0dfc85e5b19306ba6173759492ed7197bebc665416997ca83
File Path: C:\Windows\System32\Windows.Media.Import.dll
MD5: 11bd27f8de63edf680533ba2609f2669
SHA1: b6dff35c05b61b82443e6c81ae43a95ab080aa68
SHA256:09f93f44081b10729c57c7d6450488247df86dd2991551f9407f97836208470c
File Path: C:\Windows\System32\Windows.Media.MediaControl.dll
MD5: b44fe22c2bf6c1fd1a4fe16c68809689
SHA1: a5a83bf7e5cc1663a2189f6380c52b0f9f6154ad
SHA256:880b8b59164666d5b250f5985ef4600b3a2e0c8eda772c43fb25da8d09750e3d
File Path: C:\Windows\System32\Windows.Media.MixedRealityCapture.dll
MD5: 2dac8eb8450f50cfcd09dbee0167e542
SHA1: 0ba5979d036d26c9d772dbe4657d99b4391a261e
SHA256:6cd697a8593929badd8f67c6145839295a33aa67ff30aedba860cdf4ecb99e8a
File Path: C:\Windows\System32\Windows.Media.Ocr.dll
MD5: 6ed982e84609eb5096178c46a6e68c4e
SHA1: d59b0b5143e26bbb9471712c44e4ca5160c5beaa
SHA256:510d9db217751de75887520a64886d7e29573bfbb32eb4a12e15fbb3fab17366
File Path: C:\Windows\System32\Windows.Media.Playback.BackgroundMediaPlayer.dll
MD5: 8257ad7cd9638c5f49a01d3c52a880e6
SHA1: a16f6f788ff04de46b77c508a044c9f66b609732
SHA256:e648284e1a2fce21630c7a7db694d8ea9675746d535763bf1036c423e1b4d89e
File Path: C:\Windows\System32\Windows.Media.Playback.MediaPlayer.dll
MD5: 1aaebfd955ea58a5f4899bc750dc6b81
SHA1: 91d92f167b21c38f09817a506e7a07ed231e6257
SHA256:447ece7067f983e28b1fb87cb2f96355675ce247312632a6ddd00ca8c5102ff7
File Path: C:\Windows\System32\Windows.Media.Playback.ProxyStub.dll
MD5: 2ae9fb4df94df4d912c2c52e8e4b3449
SHA1: 6c892c7439ed237890c1f07c93c9968c3df0d735
SHA256:dd94c3c8322886aec74f7c9ada8a52fcef841bdd67f6b50b5cf6367930f94dd2
File Path: C:\Windows\System32\Windows.Media.Protection.PlayReady.dll
MD5: 48082a9398e551e35da22d8f415dbfe9
SHA1: 426ec1a6e2739c21fa5109debe228d66a401a60d
SHA256:cda0d7237f764fab05be4c8987b9e508d912bc4eeda991a6e6efb25e960724ac
File Path: C:\Windows\System32\Windows.Media.Renewal.dll
MD5: c7ca05cbb3a8883ed5ef572be2a2f914
SHA1: d0216108203a4efe7ed55735519ba4d4923d738b
SHA256:695fd2dc6a6fc7154ca7b7382c4b188930140f1e7be460ea240420d607df455d
File Path: C:\Windows\System32\Windows.Media.Speech.UXRes.dll
MD5: c1a18784e11e511e70d2971850d5276b
SHA1: 27a37d18257453e0f622b99e51d89a65813dc61f
SHA256:c2c942acb8a41c1d4f84d965ec8eebbfa6b8366f42db65463ca01950e688207d
File Path: C:\Windows\System32\Windows.Media.Speech.dll
MD5: f19a7c8921dc18d710f8f19aca8bdb1e
SHA1: cb2b777b0c84e71965131a3a372b047d9b2dcbea
SHA256:38e509c6dc03a9026418e9976de51f1aa0e0528b9d0fc03f67bf3e475851949f
File Path: C:\Windows\System32\Windows.Media.Streaming.dll
MD5: 2affa8d04f0c31fa8ede0b794cd999f4
SHA1: 27a63c6409a38471b9d62a46cf6f3bdad258ccd5
SHA256:a4060f31cf703fee924bbb7f60242023a31c5a9dca437fedd06922eb0e22b11f
File Path: C:\Windows\System32\Windows.Media.Streaming.ps.dll
MD5: b0f7b619dc54d75a3d00fe4833702121
SHA1: 7f2210ade468c67df3d0ffba9f422f429efb7435
SHA256:dece3a340b47cb33696fa6fecaf57a74456fa75a7e17acbea63535c5c516f7a3
File Path: C:\Windows\System32\Windows.Media.dll
MD5: d3b0c904011b185fc29bbeb33c196ff7
SHA1: 0d9cb8a72dad2ec9e50785b3be239e929a4aea05
SHA256:c96fc7e22a368eddf698515c2e5f6ef13c744b32b37e6a4fa4955c3c889f5749
File Path: C:\Windows\System32\Windows.Mirage.Internal.Capture.Pipeline.ProxyStub.dll
MD5: 3cb4e049b6a3ea63fcfe25aec13549fa
SHA1: b2bdb2ba78c1faeafb74724c6ffee6c16003c353
SHA256:a1cde4cbf77d591bbb47936fc076738ad2062caccf5aa5cfecd6c74f9d6f8d64
File Path: C:\Windows\System32\Windows.Mirage.Internal.dll
MD5: 07837d361933ce3b223087a6879a7033
SHA1: dc610cb7acdf490ff288a75e6af29d22517d0de2
SHA256:2b54ff6ed0bf542708818122e3d8dc14955c44ea4a3a3ffce6c961be831367fa
File Path: C:\Windows\System32\Windows.Mirage.dll
MD5: cef5639f2d1c6c0b146d74426725a20b
SHA1: 7689e5f4c5bb93e0cfb78ec565d59b8d58ed2f2c
SHA256:7d67ddbbcb677e6b796b433c95d0ff60a4bbed0255aaa4617ef426602d2dcc34
File Path: C:\Windows\System32\Windows.Networking.BackgroundTransfer.BackgroundManagerPolicy.dll
MD5: b583a034e85f8edbeb85d54e0473b035
SHA1: 04ef8113e006b4d03a88b5cbb71444bb3dc6442b
SHA256:8a9bf8612181cf1a3158290f0eafaa9503a55fde1def41b658b3605a6d9f95be
File Path: C:\Windows\System32\Windows.Networking.BackgroundTransfer.ContentPrefetchTask.dll
MD5: e519502e9c2081841ffd83ff3555b458
SHA1: 9908176421a11c624e51ff199674145aa393033a
SHA256:d5a1754e019398f9c5d7ffb12346b5ca4d814fe70414f09e5f23932a322d54d6
File Path: C:\Windows\System32\Windows.Networking.BackgroundTransfer.dll
MD5: 2c62bb08eaeaff8e18f6ccabb901815f
SHA1: 6580a999e35b0279de2a838e55b1589a01bc0c38
SHA256:224bea96b292c21b992cb8b2d013fa6b52fcd61a50b329979261bbcba6c75bd0
File Path: C:\Windows\System32\Windows.Networking.Connectivity.dll
MD5: cfeb16a3114528d0914a0906568bb9bc
SHA1: de1b20eae53213ed3f490365174604fbecbb8399
SHA256:d5040374dd1001a0c316620a90c9f53b67a20db9ed934e0000848138550a2efb
File Path: C:\Windows\System32\Windows.Networking.HostName.dll
MD5: cb1a09e94f8df033fa03222109fd2056
SHA1: 1587763728c354fe21a1023c3fe9109b160c3aef
SHA256:2d35a51b0fa32aba44570899cba856ed25161bb7a03a3a9e2468092fe65ed504
File Path: C:\Windows\System32\Windows.Networking.NetworkOperators.ESim.dll
MD5: fb18ef81efeb47432981210444dd2e78
SHA1: bad15806e4624b887551123c902dc203361e9577
SHA256:06e25ac5b1f1d33162fbeb8b2124338cabf75d6dc42200432db47db773cf0a52
File Path: C:\Windows\System32\Windows.Networking.NetworkOperators.HotspotAuthentication.dll
MD5: a8293656e69c1ea8aee50c5bbb7b7980
SHA1: e6ab02bdbd15f4a3393e7c0148d7a8cc71157fa6
SHA256:50090d9a17fd2119a621ad821225de7b984b3ac6d162936a4708a4efef81f2f2
File Path: C:\Windows\System32\Windows.Networking.Proximity.dll
MD5: 9e5d58909c1bd96b6bf2d8125aec09c8
SHA1: de356822a79ea6b71fbab78f9652c7a8d35fc40a
SHA256:23c2776cbcecc8b2b613ad0956d7e2780eec20be28088da5104f064952598d81
File Path: C:\Windows\System32\Windows.Networking.ServiceDiscovery.Dnssd.dll
MD5: 688f6e9fdb5522af1062665216fb68d6
SHA1: 91c3a2eb77ac363cb7ac17144c6ba997f09ec348
SHA256:4bba0b1f7bb8634fb1143e6af08fea1b2c7f8af4db827bb349d9cf0cfef949de
File Path: C:\Windows\System32\Windows.Networking.Sockets.PushEnabledApplication.dll
MD5: b5b41a70ea9cf4fa60f51c0fbd3c2393
SHA1: 2ae5090c82ece8904634865ccdffdd4f35c0137f
SHA256:531fcc1d2459b459246918a1aaeea9a6714b0f3ac9734019dc0b4d18a4f3cf4b
File Path: C:\Windows\System32\Windows.Networking.UX.EapRequestHandler.dll
MD5: 6bd4fa69dd8c3958a3c935a09333afee
SHA1: 41617681332e6dbb07db228443cf26bb25aae8a7
SHA256:04d15f0113702da23cb489b21a117d0273cf140fef3a5a4d3fa9d3ec22ec7a57
File Path: C:\Windows\System32\Windows.Networking.Vpn.dll
MD5: 307eb6cc99ba9388ece252c0c9efb335
SHA1: 6a19caac83f9a071ea4dc59c577fc23fbbcf9b71
SHA256:6484c1d5fd5a8b61dcfef3683d050b0e4afb34ce7080aee134f51d86c60f961f
File Path: C:\Windows\System32\Windows.Networking.XboxLive.ProxyStub.dll
MD5: 63f528b1b78d444f3fb951eabfb4d3f2
SHA1: 22116e323b44e5f1f2bb63e880ee4f8c9f131a17
SHA256:fd25d27c3f910498dd647134802b8be6178ea0d2511ea6deaf5e2e9759872b7a
File Path: C:\Windows\System32\Windows.Networking.dll
MD5: d9d7c3d11ed357cb0560bdafcc39f4c2
SHA1: a25d5e4433c9bc6e9ef5144b1f621c84638f84ab
SHA256:88de4d4a3c288564112dda38f624cf0b4b8a03f8a200197ac7e5a85ca4cad8a0
File Path: C:\Windows\System32\Windows.Payments.dll
MD5: fd7d07103ba44b35bc2ca053883fb85b
SHA1: 81ef12617c14ff3dc1813bd6ad41f5ca37926bf3
SHA256:842da2430f78857d51bba54052a9523ac00eb6a1d319056dc39ead7a87c41b42
File Path: C:\Windows\System32\Windows.Perception.Stub.dll
MD5: 5d7f82a6231c351e429d3b6ca32e49c2
SHA1: b01fb0e9b30b9c8c9b40761cbec1aa8921f6190d
SHA256:749cbcdf9183463d93d001d1984a48eb704056db9507f7e8a5aa126a4a3b336d
File Path: C:\Windows\System32\Windows.Security.Authentication.Identity.Provider.dll
MD5: e6730143bb37318e9b41b007c2a3f10a
SHA1: a0e9625e94d523ba790a797b305544f25724cb88
SHA256:9ec38868d78beb13f3e42742615f03dce11b1a6dd4d997f8da505e57a74d6a30
File Path: C:\Windows\System32\Windows.Security.Authentication.OnlineId.dll
MD5: ff09830ccfb9f88e1048094397de181c
SHA1: a6bfd50362066e516033e53c7d91ecbf726f9037
SHA256:34533aba5cf4de30ba25e8b0e2a36aea5f0b413210392e4eda43e60b137f134a
File Path: C:\Windows\System32\Windows.Security.Authentication.Web.Core.dll
MD5: 07a3f7bb0f0c645269e9051df394fbb1
SHA1: 3727f79d773f0966e791727401e6679b0c249146
SHA256:9fa5e1bf2c4b78dbf99e11855468ebe47020ed2a19aef5b90bd833cabe84f4ec
File Path: C:\Windows\System32\Windows.Security.Credentials.UI.CredentialPicker.dll
MD5: 231d0a31bf0f3a2e2249d712736ef4ad
SHA1: a5fe55402763620e4e9132995c0d5b375e7cba53
SHA256:bfb4e7eec07a18dd1ca8c6b52354c68c4ac02cbac0312049f94b537535585a46
File Path: C:\Windows\System32\Windows.Security.Credentials.UI.UserConsentVerifier.dll
MD5: 4d90dd328b7345a490bebd64ee144c91
SHA1: 141f9ca81e68d3fe54da143f777a6c68aca8e100
SHA256:457066d8998d389f8818fc4e4fc24e5446f3ffe0a949f1656f52d814e5c93a03
File Path: C:\Windows\System32\Windows.Security.Integrity.dll
MD5: 2be83c28a29186739939110c1b457ae4
SHA1: 8e6f4209a1f93d8f7f315bb6f59dadf780aba56f
SHA256:d175013d59b4c61ae82820f950d2411c029d63f1b43ee55f5e5e128f58130fa6
File Path: C:\Windows\System32\Windows.Services.TargetedContent.dll
MD5: 6bd8905319aef2142f28562c64f299e5
SHA1: c35cd7980c8545dd078489841d9fc764517c95e0
SHA256:7a53226489f38afb9270c86cbe49fba6698bc1bac8c82d79eb2ee0f278afe089
File Path: C:\Windows\System32\Windows.SharedPC.AccountManager.dll
MD5: beec3f642c242a24c5c7f436d9cc728c
SHA1: ebc5f9009828143aa2bb81504f84bc64809275fc
SHA256:2611d05cf09d0714051351d799dd7a3afa6480f21103218d3e6853a4eacfc369
File Path: C:\Windows\System32\Windows.SharedPC.CredentialProvider.dll
MD5: 9b45e9a46ee439eb6fb81cdbaf63f715
SHA1: 6097885776edfd2f5a38fad4ea7133cfa7d3e60c
SHA256:f3d1968ef3cfa41d33945614a1f74ba41eff0a981d60fa0d8658bedc44c498da
File Path: C:\Windows\System32\Windows.Shell.BlueLightReduction.dll
MD5: cbff26f4c30418da007d557e46ba3c84
SHA1: e1fabd83a3538325824ef95adb509e8fbe869b8e
SHA256:43b8f5ad1ad4267e507a335daae4d870dd43a90cba968429da0e4b4ffb2f4ca0
File Path: C:\Windows\System32\Windows.Shell.ServiceHostBuilder.dll
MD5: 6f2c6f64a418649a44116dd718433fd0
SHA1: ed12987d7418042c38129f236f58154dc6654102
SHA256:d3c8b501ca23b5795703df09b1a05aeae2edcbe67dd464e16a8da95ccef69a19
File Path: C:\Windows\System32\Windows.Shell.StartLayoutPopulationEvents.dll
MD5: 2ee31cdab5f153779050ccafb666120f
SHA1: ff170a637d821bcb529e49212ec04fc2b157a8a6
SHA256:ec48410f4cf0ee9d2a0d56ffc505a71947ea855c60d8c63fdb12ae7a3273a04b
File Path: C:\Windows\System32\Speech_OneCore\common\Windows.Speech.Dictation.dll
MD5: 681c996962059e108aca4d1b659baf17
SHA1: 8c8b3747aaf086c57afe71ecdc7632f434894c2f
SHA256:57425eac5398f2af3d5f0c22fc021b69a7a29aefd580c391356afc25ae17afdb
File Path: C:\Windows\System32\Speech_OneCore\common\Windows.Speech.Pal.Desktop.dll
MD5: 3c4bb5e0c3e096174babc4c86c140a93
SHA1: 8d07627fc25c0df404c3bc4730b46cfc8ee3b026
SHA256:149900d145474bcee085ecda25fca2d2621228ba62d15bb574bc9c4c652279a3
File Path: C:\Windows\System32\Speech_OneCore\common\Windows.Speech.Shell.dll
MD5: 64518d15ee2972f6ef8689b1512f748b
SHA1: b6a512f9262a94bfce8bdaed04b310bb180fc7b7
SHA256:46f2863f26c03472f8366be5b170d2f38f740395797822188215d2cc73a6cb9e
File Path: C:\Windows\System32\Windows.StateRepository.dll
MD5: a7dbd0d13c3c8a0266541359cd73e828
SHA1: 6e192b8efd6be9acffad1add1fae327726b8f41d
SHA256:18cb163d6cca3183841fc7c419f53b81942ac7df7e41cb13ce43e8ac575a71c8
File Path: C:\Windows\System32\Windows.StateRepositoryBroker.dll
MD5: 9ba33896113f90e9c10549b8512aa285
SHA1: 7c27a93d5341d78bc10db75e0cf246a3ca3179e3
SHA256:fffeac5fee2d69c95f22d81799a794fbf72d7a388db8f7a4c664180567e37ec0
File Path: C:\Windows\System32\Windows.StateRepositoryClient.dll
MD5: 133b752e3558c2926b7db331c7716b78
SHA1: c814ef9c9cb1ab3c2f279996bf0f499a559d396e
SHA256:64e45143cc1abb86b9618f2382385626a40f05a06cae20186ffb75e021fa53bc
File Path: C:\Windows\System32\Windows.StateRepositoryCore.dll
MD5: c530c61c69eaeb74912ac07eab610a3b
SHA1: ac1752e99459b94f025dabeb8a2b1b98a094a866
SHA256:60918851e45524dae02229c4ffe579c304cd270422e4af49b05c9054fabe0814
File Path: C:\Windows\System32\Windows.StateRepositoryPS.dll
MD5: 469b1deb0a5a1132202bfed66ea0dec8
SHA1: 23484288464fbce5349d14d1c14c5dface7952b0
SHA256:fbbf3edba529dae01d469ed0c42994321072d238452dba1200e19730b4270335
File Path: C:\Windows\System32\Windows.StateRepositoryUpgrade.dll
MD5: 161ebe1654d82fd47be21fc5661744f7
SHA1: c40199a0e4ea5d4455917cb992e8c594d2a2bbf0
SHA256:a76fd468764376f640795f1fdd06555c349f012aac453034118740abd5fda47b
File Path: C:\Windows\System32\Windows.Storage.ApplicationData.dll
MD5: fde01984083c9139c381415146b4f314
SHA1: 7677d0795c63943d135d93ca91a79463c3e803a6
SHA256:0e3a5752d361ce8a6289aded162943fb45df24ae3bfb9f1af50a7d96d25650b1
File Path: C:\Windows\System32\Windows.Storage.Compression.dll
MD5: 03279496e76706b596074678ad6999eb
SHA1: 25005a2ed8e8aee70d68a677fb8c7e1408e199f0
SHA256:26ae1e2c1b6b31fa7864d90b82f03ab7bf8072fbba026d71b4e16eae1ea5f9da
File Path: C:\Windows\System32\Windows.Storage.OneCore.dll
MD5: 6b3d0201c1f81c180793fd0820caf1a0
SHA1: a74c55ed80792ddc94069c3eb32c625d22e5d5e8
SHA256:a3561e8b926bea25ffe4faf98ad0edea79a4e48d9308e068c3e67f7201c3359c
File Path: C:\Windows\System32\Windows.Storage.Search.dll
MD5: f725dd1da491ce7d6bf2db5e7f3e450c
SHA1: 81af93384afbee852ba5b60a3609f4b59c50af9d
SHA256:5821b33dfd16bfed44fcccbcc245890b575cbd3725c6b4c6c2da820c85d8b201
File Path: C:\Windows\System32\Windows.System.Diagnostics.Telemetry.PlatformTelemetryClient.dll
MD5: 344eb5697b8662eb50ce6029510b6c65
SHA1: bfba0790e13f85de96999cb3880fae191ee8db88
SHA256:343fcf011a91955d660dfa17051c830dcfb499abd380cafd6e3708d8e0e4f7b5
File Path: C:\Windows\System32\Windows.System.Diagnostics.TraceReporting.PlatformDiagnosticActions.dll
MD5: f58c3902d48b0f41bc84c0ed596dcc70
SHA1: def885c0872f1d5092294a6ce615540698c0539b
SHA256:eced618758ae0c4f0e971a331045ad0f14ba4c98f90107670fe9c836fa1d56c2
File Path: C:\Windows\System32\Windows.System.Diagnostics.dll
MD5: 2e9f21d81f6fdd66fd5022e2346472bf
SHA1: 18e27b7e5b81e524a16e215f513d6c7842b2ba05
SHA256:ea370fd64bfd19382268e7b80d969fd396ab7cd883c3e9582b33e2bbe6c0987c
File Path: C:\Windows\System32\Windows.System.Launcher.dll
MD5: 3c5782116e35a662c8fc7e61f2b47552
SHA1: eee4beeef65084e8686919957a2f8e4edb90830a
SHA256:ef964e032afa537e58fd65c48ee00a37630986ab597d8c7d73e5ddb8746ec636
File Path: C:\Windows\System32\Windows.System.Profile.HardwareId.dll
MD5: 32ea1be010b1e46430b2a6451f3d9db9
SHA1: 4ce6d9c4049221b558447c16a15653ae43ff38b0
SHA256:0fd37386ed009516b7fed6932130166b491c137b36a338a8be1f540026fd44a5
File Path: C:\Windows\System32\Windows.System.Profile.PlatformDiagnosticsAndUsageDataSettings.dll
MD5: 3a7da273e5cc23c4a894226bb480843e
SHA1: 52ff849fa9ad8868600a83d380c4ee08510cea59
SHA256:4ccfaaf55fb58fa64ff6fdd81b02d26494b1847a8cd27d7d5c188e7e3ce2e001
File Path: C:\Windows\System32\Windows.System.Profile.RetailInfo.dll
MD5: 54b797a67f84d9a9877eb597e17df3e7
SHA1: 381b6f1ad21aec100e6a903a678c18457cda3a48
SHA256:f19737c387323437fc129d87aafd7bdf882051208535bded46eb4832c472bbbb
File Path: C:\Windows\System32\Windows.System.Profile.SystemId.dll
MD5: 5a3a725bff74b2406b610597cb5bc602
SHA1: f267a8954474702b8af3ec0dc629682aa9ff6afe
SHA256:85a992c6626031ceb90f8c999adf8333e03fe110fd9da917afcf6d5180ae8f1f
File Path: C:\Windows\System32\Windows.System.Profile.SystemManufacturers.dll
MD5: 8c3a98870ead6ff83d9a02a878ce9747
SHA1: 65f9674ce9ec137b32a1188cd6f5329655346503
SHA256:e968b77d048c3a2f9b2e58f672ab072191fbf37690ec5edba9be166bd0a35460
File Path: C:\Windows\System32\Windows.System.RemoteDesktop.dll
MD5: 94ca15a1b314a7421f6e9f81bf851ad8
SHA1: 9a77f51401483332b891a86542397b59e66c2455
SHA256:bf744efd59ddf80d571bc11865ade274c3904a03c77c71084dee6ab4c260058c
File Path: C:\Windows\System32\Windows.System.SystemManagement.dll
MD5: 512f7bb4582f58551bca3d6dbe8e7e2b
SHA1: 336bb65be305fed337d30d586c08ed970f3db08b
SHA256:09d6e9318a5cacac683ee596d30ac511d6be789e0fc1d8af050b15a86e28f99e
File Path: C:\Windows\System32\Windows.System.UserDeviceAssociation.dll
MD5: 9d9039ad2cb1195a0cdb7780458b04d5
SHA1: 468ace3ae8e5eaeb863f8aa139bfc2f40f9dfabb
SHA256:6ab7fd5f221eabf5924ac698b703b502eea55f9e3809b5ea410c359d14a2cfd7
File Path: C:\Windows\System32\Windows.System.UserProfile.DiagnosticsSettings.dll
MD5: 7165ae9e36b0e3c010fa922f7414b8e8
SHA1: 3015cfe0fb92f69cfd0a5f7b2c633a3650a60eba
SHA256:88b3ffb468713fa6d10dd2302bbb52032e08dc2e7932bda008bc08f3ce38b881
File Path: C:\Windows\System32\Windows.UI.Accessibility.dll
MD5: f54ceb9d563fbd5d9122b439a0c13617
SHA1: f4e9e921287c22e1ccb7fc796b94b3ac417903b0
SHA256:6702cb8fa86bd2ed0aae2e1fd120c131ac9a0e6cfe35343cc03f0b3e1bf10e36
File Path: C:\Windows\System32\Windows.UI.AppDefaults.dll
MD5: bd849fe23181370bf8aa15d70c3ed0c1
SHA1: 90c0ceeb4489661e4f9d2b300566e94548a6c8b4
SHA256:f82643c49176fd4c066872d7ec3911a2c5d91b8b98898ad3dccf8c3d7c5a5751
File Path: C:\Windows\System32\Windows.UI.BioFeedback.dll
MD5: 0de7257a32ec6f8620b531f2da6b358b
SHA1: 472b2997c91f4bd4faea2ab7d80c316b364b9cf4
SHA256:e953b1e3766436267672636f3ec83fae0b602ca902f90b123d024ef4d6a63a55
File Path: C:\Windows\System32\Windows.UI.BlockedShutdown.dll
MD5: 5df8788a108e9d24f5440a6582648150
SHA1: d0b72460b0cd078936b22ae02ac717feb60d51af
SHA256:71bf0473af6c286559a4327a5f21382a522a2a2844c7415183a41c3d2b94bceb
File Path: C:\Windows\System32\Windows.UI.Core.TextInput.dll
MD5: 33db4988f0672cc254db30be099a157f
SHA1: d8e5b613ea7843e8faf4050f22baf34fe2192407
SHA256:1351e93b6657305cba518cb1a24cc323863a3f2e67052c6394eb9aeac47be653
File Path: C:\Windows\System32\Windows.UI.Cred.dll
MD5: d6c5bf62d6697060afedcdc6d93491e6
SHA1: 4f91d9a77625ad91ba0923edb01de9024531bb98
SHA256:3172796c6c8bea861c533c8f876d8500e6c2500c1be4f3108b457d71ca7ec6fa
File Path: C:\Windows\System32\Windows.UI.CredDialogController.dll
MD5: bbd112daa6ac56628563c42247f8bbf0
SHA1: ed44f9a43ec1a549d382124863da6228b6184bca
SHA256:2ecd4ecca12ecf5be23d73c16abc83ddeeba623a167df9d8d111c47aad20a879
File Path: C:\Windows\System32\Windows.UI.FileExplorer.dll
MD5: 697e168118733da59231202375ee391a
SHA1: 9c852d64a6701c616f4a6f16abbc4bc57eb4cc77
SHA256:9ca4b0b78424a612106db2e9307bc70503d89b314e162fc70658d37c39209b75
File Path: C:\Windows\System32\Windows.UI.Immersive.dll
MD5: cc3bd8fe6799faebf739c84b08114ef2
SHA1: a1313dba7de19d98f2f06fc802c6fad964577bdc
SHA256:395f753dabc39911c8795edff569e357e170074b2926d5a7153bac898ad85c78
File Path: C:\Windows\System32\Windows.UI.Input.Inking.Analysis.dll
MD5: ad85d06f72bea3187bab3db8227a3c9b
SHA1: 4a6b65c57eb1d61e059de45db59bc602e6467945
SHA256:674699e5c13cde663f49e113dd21036efe8a765a3a085321c7e05b537ee14ad4
File Path: C:\Windows\System32\Windows.UI.Input.Inking.dll
MD5: bfefdbd5362006b6eff23dcf9f0c27fd
SHA1: 9596d3eb9439fe7ff2361dde5c9aceb7470d808a
SHA256:4af65c62ea2b2f120dee4581a4d7738fc99b278d85433e044588df185cd02dfb
File Path: C:\Windows\System32\Windows.UI.Internal.Input.ExpressiveInput.Resource.dll
MD5: 7a82b1eb356c4cde7c1e0e8fb448123d
SHA1: dd87cdcc79f17832a1334945598ccc34ee01f954
SHA256:f37310840f38cd2f46b1ee3644f7cafd218171e72426e2820181eb2f84b49ecd
File Path: C:\Windows\System32\Windows.UI.Internal.Input.ExpressiveInput.dll
MD5: 4101064c79452055561bf7cd30d10996
SHA1: a93ca72fd17465c295676b64fa42ccc92959158c
SHA256:013465bee556f2999d323eede7f5ab607dbfd1a37026862bc6546a0a3003fac9
File Path: C:\Windows\System32\Windows.UI.Logon.dll
MD5: aacc9b163ace26c02b9f67bc67d545ba
SHA1: 480cf242fa3da049e075a5b0db6ca90cd9d404e7
SHA256:f8b10e922686e812a7ebaf81d92a2dc2054916cdba53c803d87739e39f30cf38
File Path: C:\Windows\System32\Windows.UI.NetworkUXController.dll
MD5: 78dc9e4230e062cbb4735270629f0a37
SHA1: 0d62a470998221b620513bfab6786f4e04806349
SHA256:312fe9744d73688056c6357dc901c6ba1c5876459629fcf2ca34cc23c5870d41
File Path: C:\Windows\System32\Windows.UI.PicturePassword.dll
MD5: 42238ae1910050fd681b661cb51a4d63
SHA1: d0c50dce054b35f3dfc2613e85eec8987e229f1a
SHA256:42c7b072d520fa030ddda64b79cef13e08e324a0297f71d569528d9d4caf278e
File Path: C:\Windows\System32\Windows.UI.Search.dll
MD5: 9c84926684589277c4a738b652924dc2
SHA1: cc2c70a5dfd92a268e00725d2f714361b3e2f4c7
SHA256:78118fc57a5353f6fad73a9eecc9212e9e24bbc8e23d680509469ce5dd77e64a
File Path: C:\Windows\System32\Windows.UI.Shell.Internal.AdaptiveCards.dll
MD5: a14f55d0d14b58c40db8c1909a65ed4c
SHA1: 1ec1a5f4612a1176e959a47212bbb39317af8403
SHA256:55d783709cdac634daf75583c6e1cf87238373173a39a0e03e5131928bacf9ed
File Path: C:\Windows\System32\ShellExperiences\Windows.UI.Shell.SharedUtilities.dll
MD5: b066f2ea51e0d37761aba7fc7257ee68
SHA1: 26598640f28d2dbebb6723fcba3beb1aade31a7d
SHA256:4b21e0478e16f04556c9a660dc42d5b9b5395241dbc1918d0d49fa90c7a09664
File Path: C:\Windows\System32\Windows.UI.Shell.dll
MD5: 9385bb9982e43f3a3ec8cbafe59735cd
SHA1: 36dd009ded141e8762b6fa29e3624aac8f02a687
SHA256:326f20fbf570f5cf13c708dfcdd6637315333734ae283514872a8a14bff45481
File Path: C:\Windows\System32\Windows.UI.Storage.dll
MD5: dc8741909f3b17f3a7bb7b1840bde118
SHA1: f3778888696df53433746c87eabae35ffa5b9515
SHA256:605b17722bb54c00426b22a38475dbad85e4d762fba53f27eddc192b028a26b1
File Path: C:\Windows\System32\Windows.UI.Xaml.Controls.dll
MD5: c2697c7eb5b74940d5ac8a25a0c5e46d
SHA1: a3e8f55798140c1fa31706ea0dcc8156d5099cf8
SHA256:65965dd7c3d1206eadd78a6bfa785e05b57007e3c3f8f953b5f54527e73b62c4
File Path: C:\Windows\System32\Windows.UI.Xaml.InkControls.dll
MD5: 5c8b129c4dce1db90924c5319246b81b
SHA1: 3785a6cf3722b5e99743811f69d24328781acc72
SHA256:3204b1b0352e6ed2b7826b6c9efcff239b6afc34e39d435f197365a75c61ffd0
File Path: C:\Windows\System32\Windows.UI.Xaml.Maps.dll
MD5: 2450560db63ef99cbba57e1ea43928ab
SHA1: 6c5a3f3c418fd77d14be5fd0c39d1a05f6cbcea1
SHA256:94d37bc8bf6c45edc75634445fe99bff07a9d808485631eab026249cb84701a3
File Path: C:\Windows\System32\Windows.UI.Xaml.Phone.dll
MD5: 4f48bb8a314933f17b9696959388b923
SHA1: 279cd6cca9dfe37957e06388e70624fd693aae02
SHA256:2cf74140ad2c19d25f43bddedf1f35b3ddb52b63ba8808c936cbb72b2b90ccd2
File Path: C:\Windows\System32\Windows.UI.Xaml.Resources.19h1.dll
MD5: 37483c85c007802ff6a384a04b71a44d
SHA1: 6faa15d052a6f92e5c860faaac283c7da7e9836c
SHA256:53e387754c28f6d1739a00323bbf1d56dbc95c4c702db0cd6ab58b283e99685f
File Path: C:\Windows\System32\Windows.UI.Xaml.Resources.Common.dll
MD5: a384bf113055cef5cd3851252bc829ae
SHA1: 1a91ffe980d2ebf711f3af5320011142e4ec071a
SHA256:8dfff4557e9fc70c3f7fe9cf222db263de7ea3faaec7e7331753e72f2877bd55
File Path: C:\Windows\System32\Windows.UI.Xaml.Resources.rs1.dll
MD5: 42568679f77d4073b1f997a4bcb95dbe
SHA1: e1bbc774eafb855db744f0926eecd1e8bec06607
SHA256:c0f67563688a0eb5014f4be1f950d324eb1801265f01f84796736ee6d1563d35
File Path: C:\Windows\System32\Windows.UI.Xaml.Resources.rs2.dll
MD5: c43b25022d4c1194d7b229a168959785
SHA1: a368482465d1ffca77cb94b14012d4cdd358196b
SHA256:73f30ca21e70cfdeda28e908f4c77ef2a90ba2479ff7e00ee2e1367c011c11db
File Path: C:\Windows\System32\Windows.UI.Xaml.Resources.rs3.dll
MD5: 807fd980d3a78e7e02829db1d32c90da
SHA1: b4ee506b323291651f737ed2cdeb60b913cd92e5
SHA256:c235197f3549d8964964c441fe22eacc340aaf0e732f84391c8c91aecc17e0dd
File Path: C:\Windows\System32\Windows.UI.Xaml.Resources.rs4.dll
MD5: 293d1f9dc838e8edc68ff06a12c55cd4
SHA1: 47b4cdbe98742387eeb66ea4b2a35b30c3a6a14a
SHA256:e10a4379407eb32e3fa95be647052eef8aaed10dc6037c44fcf9fbd36496778a
File Path: C:\Windows\System32\Windows.UI.Xaml.Resources.rs5.dll
MD5: 99c8ff384a772ae08e28bff47846583a
SHA1: ca9f05845f8cf72ddcca51690593ae34a804756a
SHA256:56df4dc74339c3182bade61324a7d9187b256e3a1555952510d6f8eadb1f82bd
File Path: C:\Windows\System32\Windows.UI.Xaml.Resources.th.dll
MD5: b3a4e16361e09cde70df873ad086c7fb
SHA1: 6ccfab28e942f685bfdabdac7d8f3b319858edcd
SHA256:f7ddcdcdf8ba5426366b63a1bee98c2084e3f2e23d5b21353521dad306fae7ef
File Path: C:\Windows\System32\Windows.UI.Xaml.Resources.win81.dll
MD5: 9d131e50f26f7792768b053e769876d0
SHA1: f5c4738d7fa766fc32a668e591756b0023952063
SHA256:eb9829ed66f5cf7895a5cc1fcd9b4482dada2696e81dd2399f3da50f5fe82730
File Path: C:\Windows\System32\Windows.UI.Xaml.Resources.win8rtm.dll
MD5: 6d3bc3e1cc7e87f11e00bb3868232e97
SHA1: 3bbb7f47a736100224752fa609cd6a41ee40da7e
SHA256:b3db105a0eda601ef162d690ac2bd405cbdef00eca0bcfbafcfa9b0206d4cacd
File Path: C:\Windows\System32\Windows.UI.Xaml.dll
MD5: 55e07186427bbed31ebaf56f21174fd1
SHA1: 01378a2b063398b578aa9be1f55c7901b2fd56be
SHA256:bba6d0a5d128779d95366e41e41798a28d532f062d82a2e44c71b616caa7388d
File Path: C:\Windows\System32\Windows.UI.XamlHost.dll
MD5: 2c72611714990291ebab15c6edec3fd6
SHA1: f2a54652f266d12f6ea0e4f345976a4ee035bc8d
SHA256:fa6ad2ef8d3c74b69ae640db1a0a490f342244da385dc3962b81362e2b221ea1
File Path: C:\Windows\System32\Windows.UI.dll
MD5: 531bdf35284f31299189468b9e72afdf
SHA1: 757161a41b21f9256a768624c4e8682c31053059
SHA256:1d7bd502decc1c0266e3e63678febb7bf0253ab90a2c0bc2fe083097630125b7
File Path: C:\Windows\System32\Windows.WARP.JITService.dll
MD5: d50327212510891ddd03538bd264a6fd
SHA1: c9d47ae59ebeaa2b4ac9059d0a2366f8339fee5d
SHA256:04b179c849f70bdd0a3bf797bf872007afe3462256a8e5e9da2103519899ebec
File Path: C:\Windows\System32\Windows.WARP.JITService.exe
MD5: 49685b19b6852105dbe853bcf2703c13
SHA1: b052172b708caa4e32ba6b73db2c27cefb78ac02
SHA256:d1e08558f9cd56b7e39ce081b2cc598b6159f4ad35b4775b2b0ebe63d66c7018
File Path: C:\Windows\System32\Windows.Web.Diagnostics.dll
MD5: 8d2ce457140680b0264aaacdb8a2067c
SHA1: 8decb7d2ea887d99359e541af13927169604b434
SHA256:a8154fadd9932b5e8a195899a069720da35b192a54f2e79b06d9ab645051b093
File Path: C:\Windows\System32\Windows.Web.Http.dll
MD5: 0a35553bad65e246a255131ecb418d14
SHA1: 51009dbfbe7a29e57b35b5391e05242ebd29fae6
SHA256:22cb82347a2ed6ecb4afa91a238675da57fc8f1bb352b3ff3aeb508f83adcb7c
File Path: C:\Windows\System32\Windows.Web.dll
MD5: 3b83a9296172755952824260339d1726
SHA1: b3f2989bfb6186e7ee3c7c0d7c8a67b87e35cdef
SHA256:39f44775a60cbb789285b9080de8409a21d3b0b97aaefe6905f3edaa97134674
File Path: C:\Windows\System32\WindowsActionDialog.exe
MD5: f263085125c4d2af70ce208542842779
SHA1: 5d93a8aa33bc81309a49ed1dd080cc182b48b797
SHA256:0802fa8e9716f650d7fa87b05ea8b35103efd637af158193c04e414a35baf9bf
File Path: C:\Windows\System32\WindowsCodecs.dll
MD5: 92d221839a648026778d443143ba95a8
SHA1: 2913663f90f48ba957ce344d1d6a30c6c089e374
SHA256:caaad63a22fa088874aa26a02de07bebbb49e15428f4c86048e000bc4bbe2547
File Path: C:\Windows\System32\WindowsCodecsExt.dll
MD5: 53e766a7e20043cdfb29c91fd72f9ffe
SHA1: 70531822aaae0473287536155a0a318a89030b7f
SHA256:65f6f1b0b3007501d811c2fbe4679f7c0db95440a78f0650b28f94468fd348bf
File Path: C:\Windows\System32\WindowsCodecsRaw.dll
MD5: 218dfab0adf3c9fed1da2e124c0a4c5c
SHA1: 294c0a29246427c572f85bd06ab62ab9d413dd48
SHA256:b11435a0aefd2493960c35e2159aeebfafcc4a0e17db9bfb9d50e6c565b79a4d
File Path: C:\Windows\System32\WindowsDefaultHeatProcessor.dll
MD5: 00d0d4e965bea601bd970e121bbc89fa
SHA1: d5345c01d32e9d29790fa9a8c437191580c73759
SHA256:470c03e212796e91f1d85a1c3a6c16a823095862317231e64338b58f5a2cb295
File Path: C:\Windows\System32\WindowsInternal.ComposableShell.ComposerFramework.dll
MD5: 65d8f823bbefaadf3ad176109c40879a
SHA1: 69d60fa218ed935af98d17d173d9695c329e6bef
SHA256:7edaed4b0d13df0525771e7d568e51c69b951b228635d78a8bca5fbc9a2fad6e
File Path: C:\Windows\System32\WindowsInternal.ComposableShell.DesktopHosting.dll
MD5: aca22d42fcfc7e96e3657f8b6dcef899
SHA1: 9f6fda2fe43890cc7191ef2ea89fe0544d665e17
SHA256:8d5bf3110845c5f8d9ee96166098f4566d49de98c01c1b5dcd4ef11ab09976f7
File Path: C:\Windows\System32\WindowsInternal.Shell.CompUiActivation.dll
MD5: b0f5fcca70022d9d388022d2324ffc44
SHA1: fe81eb209b3cc10dcb6beb48d3b4c7d1b812c0c2
SHA256:8d51d4ee80ca517974f9ad99f311a6d85fc08472c2e2448775aaf395e2911d49
File Path: C:\Windows\System32\ShellExperiences\WindowsInternal.Xaml.Controls.Tabs.dll
MD5: ed40595dda5f248d87b0e94a958b5e5e
SHA1: 33c3849fd3a5970da020de0492c31f45aa49e6f1
SHA256:6dcdeec608f75482ac2b70d1f23e62d65deb50803a66acb0bbc3bcb8fe8b5ae4
File Path: C:\Windows\System32\WindowsIoTCsp.dll
MD5: a0c34b3c73fa4bfd4620ac2dbfeb0ff8
SHA1: 7e35c8454d4b269c5d1bd250178cb9aebd685773
SHA256:ea47db208b10bfad07df495bdfe5fdc103a4c09bb97f4254ad374e21ddd8297f
File Path: C:\Windows\System32\WindowsManagementServiceWinRt.ProxyStub.dll
MD5: ebae35871fd99da5c4117d34c1c85e24
SHA1: 7309f425f4830aae2e519d021664e70337f1ad67
SHA256:891d3b7fc8c30a6db89d971da3a679ca52d44dc7db64cdbd703f6b2aca5eb934
File Path: C:\Windows\System32\WindowsUpdateElevatedInstaller.exe
MD5: e8ef92b2b906320538ccd03ce48c78f5
SHA1: 0c0110b1fcb13b7c29a1a837bfa23505eb67177e
SHA256:52d46f1339ae52f63ba11ad61decd9fdab4b2f9895ac07632f376bca2f4d7784
File Path: C:\Windows\System32\migration\WininetPlugin.dll
MD5: f86690b96e4bc43e7c226dae68ca93d1
SHA1: 65390c29bae05742e7b5b59597c175074c108db0
SHA256:5af952999496e6caf6c08fcbd82c9b5ae6af7c4872085f656366e93cc70778fd
File Path: C:\Windows\System32\Winlangdb.dll
MD5: 5fa85418be9571308feec871fb7f540a
SHA1: 10a2fce6b38ea03dc3a9ce365cea0bc7f30bbe10
SHA256:a41d9418f9d6e67195670c9e8dec43064eb6839f33209723b7ba66d8e8bc94a3
File Path: C:\Windows\System32\WiredNetworkCSP.dll
MD5: 7973f4fac28715c74a47752868593566
SHA1: ae555f12b9809bb9c2e02ff0cdf3be35d57c231b
SHA256:e8b7bf1e067b5526df244446ad07bd473187ce4b65364554e7fdb692ef659e74
File Path: C:\Windows\System32\WlanMM.dll
MD5: 6716f6e79d223681f296b2991ac54925
SHA1: 0e5a06f720644bc1c55111139039434079928b57
SHA256:93a5ba3507ab681c285699e02124cfee8023a7a32b858896121194a458a1e455
File Path: C:\Windows\System32\WlanMediaManager.dll
MD5: c51c0c369c8d701629026d2452bc8d59
SHA1: 719b2618b432260e0e174906209040dd6a8c8570
SHA256:f1910ee1491d57deb8452596f4d364d7e72e169423f2f8ba598728da47e38b58
File Path: C:\Windows\System32\WlanRadioManager.dll
MD5: bc03572751083fcaf62795dee79400e1
SHA1: f953d3c60cce1462bb89c89412e0e576cad9b608
SHA256:7b7b3b275a9a04e6e9f9b4ec02953ea7d6f8cf557424931f424548a87adcc149
File Path: C:\Windows\System32\Wldap32.dll
MD5: 6c16fcce61a7d122fa71ae06bbe49d0a
SHA1: 1df7948f5bfeb659ff95d316a70804d4b305bc6b
SHA256:cde670ef6fe69980d01ed998d2e8fc4b54e699f4eea5c3c4bcf2ab282c0e8165
File Path: C:\Windows\System32\wbem\WmiApRes.dll
MD5: 72639377f8c2f05fc7094225ae4a040e
SHA1: 0432ff0b42d8437339b244ea1bfda32739f88bb0
SHA256:61ba0fdb15affd697e635e1e213123b8a8f2a8c9b46d8aa04425b3e6240ff4df
File Path: C:\Windows\System32\wbem\WmiApRpl.dll
MD5: 9fa23dae5e2959a713e16b4d25ffed79
SHA1: 921c4820e382eb3cfa66b3027165ec7101c1ebbb
SHA256:55e0ba2db4303937bc22dfdb19d4c18e2ba322aef836ae0eb73cf6c488d8ca9e
File Path: C:\Windows\System32\wbem\WmiApSrv.exe
MD5: 63ea87ca346dfe331eeaf3a4a4b65205
SHA1: 3231099ce335f5ab47fbf869860d59f3011fecfb
SHA256:e0c6f9abfc11911747a7533f3282e7ff0c10fc397129228621bcb3a51f5be980
File Path: C:\Windows\System32\wbem\WmiDcPrv.dll
MD5: 7c24bcc7b06a778e228d7066caba3d01
SHA1: d5fdab12b87bcdac08ccf9bd82c3889e217027dd
SHA256:e8d4d7ba1c0e6161e8ab5744e4c2d563acd41294d812993b5b64d83fcf377806
File Path: C:\Windows\System32\wbem\WmiPerfClass.dll
MD5: 83482be78e8e88bd7ded4b24bad1637f
SHA1: 6ef0a1951a382ec4f8176637d9a700eb89788c55
SHA256:05d68da8911641fcffd616100dd08b51a5d93782d9f64365be1f3fe0d6ca6471
File Path: C:\Windows\System32\wbem\WmiPerfInst.dll
MD5: 566c8c9ac0456ccc45860aa9a1ad5485
SHA1: bc3b2c25ca37a34bb5a9c4d6f7ab4d2e2f36deaa
SHA256:85fb5e99300f90df49610415548d345ee1e0494f0b744f538bdb43c1567cab4b
File Path: C:\Windows\System32\wbem\WmiPrvSD.dll
MD5: 92beb33fb2b69e6d6b0a5a7565701b25
SHA1: ab5a791d9078c510c2201d3b2382d10fa2d2aad9
SHA256:4f1de69a4ac73e9e209ef42d7d3c4b450716cc3aac9086f96afeed64d2be5136
File Path: C:\Windows\System32\wbem\WmiPrvSE.exe
MD5: 8bb61c2b1e34ff3c778cf150bdf08238
SHA1: 7f530281c5ba86b81ae4230dab1617cb55260d9e
SHA256:8bbdead7357af7bf0efe397f9fd7e0ec578755eb8bdbaa65ae4f28ef00087ad5
File Path: C:\Windows\System32\WmpDui.dll
MD5: b4950f8b1937c4cb1c9bd471695e257d
SHA1: 09fb030d008a49d2711163f1bf4cbd1447022d82
SHA256:82b9fb53c3d25e4ca9370723c532ab894929c27cb1bb5e83c65a8e6deb9cc2e6
File Path: C:\Windows\System32\WofTasks.dll
MD5: 0ba84aeca2bd6c40068f7c96f2fac076
SHA1: aa6d4a5c5f0c32b1932bb6260b06ba1b7fbf27f8
SHA256:1191780d72739e46f023d1b4ae30caf0c4ff5d503188709970c889645b7a2239
File Path: C:\Windows\System32\WofUtil.dll
MD5: 15fb7f0bc6665c5f339e6d0811ee2205
SHA1: 2316930e1fd055222d38f887c8969c7d10efaf52
SHA256:ea4dd90e10593315a46632dbf29bbc39c2913eee6fb4e1f9bdde806b0e334a03
File Path: C:\Windows\System32\WordBreakers.dll
MD5: 6cd855f143c8b9f286282714d3f12396
SHA1: 3b56c1b0dbf35568fb30e075f4f564b6d7c837cf
SHA256:55f1ebac90714be567ed1fc1ce919d232fbf86c2ef6a77931df77bbd12226e5e
File Path: C:\Windows\System32\WorkFolders.exe
MD5: dad998cda9453f4207880bfb62f79358
SHA1: d6a5f82a05a5ff009325a96085d4b9544b0256f7
SHA256:418512b4980c6758f5bfefe796a744ba159bac94a8d175b0fef07b973c2baab8
File Path: C:\Windows\System32\WorkFoldersGPExt.dll
MD5: 58aa2dd47ebaf03974c2b6b794ba126b
SHA1: 0075e74edaf8223e61cfd19878229c8af24ac008
SHA256:e8e332ad54eec48a8d2d2b795d684088c41c964ead512f5ffb39bd33b618ee70
File Path: C:\Windows\System32\WorkFoldersRes.dll
MD5: 268d2ac1dbf7eba04e0ae10e8c812331
SHA1: 223223b099e8c6c858ac5c1b7ac585d701b4eca4
SHA256:bd1dd4d3211d9d95ed601b0f0e2e8a9e9ec284aa1f2cb4f06ccd680ceab5eb08
File Path: C:\Windows\System32\WorkFoldersShell.dll
MD5: 58b40fde639895197491b2a01d39c620
SHA1: 17566f3d549cbc61696013c7e067b76d24fc24bc
SHA256:ca61b67837a12cea980fa204d23a6ce7582cd83afd6df400d8c8787ed00668e2
File Path: C:\Windows\System32\WorkfoldersControl.dll
MD5: a08c99e4d1904138a72aa2b9ba01d464
SHA1: bae678e8d327d34315c9d058873c61166cc71d3b
SHA256:4f604d8bb6be0cc6a63b9fb404da46e7cf76b83a15d64bd5a3b3c6ac9945fb91
File Path: C:\Windows\System32\WpAXHolder.dll
MD5: 2341bc9fabe2a1185e867b948da4a2c9
SHA1: 30f6a90cb1e578c9d1a21b2f419defdf71c5d814
SHA256:9f9cf9ce85c633280387594dae86e74352f06d5441b9ec3938e11f7a188d2e93
File Path: C:\Windows\System32\WpPortingLibrary.dll
MD5: ac34e9b1eb5b9fbacb80b7c6640b869f
SHA1: 99c9a4344a1ac2fcf849b3bf8da39027ac93da24
SHA256:518469edf885253c015af075e03365a9ffc92cc712670bd4ac48c387f6c2ab91
File Path: C:\Windows\System32\Wpc.dll
MD5: 035fa37fe85be6ed8ef103320e22c8ed
SHA1: 3a2b9175f9eca782f8e5ac8cba3b2d6d4941b694
SHA256:f7e0099f9765c97dc886283ff6a40e8edfa84935462ee47cfeb7cef3386f7365
File Path: C:\Windows\System32\WpcApi.dll
MD5: 5b65da673dd6fc49fd5d0411a12e2219
SHA1: 2e3c196d825fe606d99628e9027045c53338a475
SHA256:7f1e5ab9f82bcbd665eb0d4e8019562d0ce660654a87aff249e12fa7526ec87e
File Path: C:\Windows\System32\WpcDesktopMonSvc.dll
MD5: f218b60582a9d5c0ebde21b18eb9011a
SHA1: 65d81a30ad177555fd3e6393dc28213248b9d855
SHA256:64b11174edf53180a6c294fc96d6680428b3d8e5242f282f12eaa7600cdb488d
File Path: C:\Windows\System32\migration\WpcMigration.Uplevel.dll
MD5: c92661b900b934ce4e4b7d047aba74e5
SHA1: abf1d9b1058fb1f14a091985bd3fa3c2e9140702
SHA256:85302fc70223988f2e94c5b443afe8c95f73695f60778bdc8cd5e1316a701841
File Path: C:\Windows\System32\WpcMon.exe
MD5: b1fafd88284d5769efcb032e868ae871
SHA1: 5516b175ac24cd06356f99459ff357724cc48df6
SHA256:b8e34cbc68fe84b14ea7a4ef73e870c9e89c4f674f6ea634e275a58976128a06
File Path: C:\Windows\System32\WpcProxyStubs.dll
MD5: 07c8937565315fb1434b4e0501a1e937
SHA1: cff16499f038c08dd3dccc038f0292f9974fa21d
SHA256:73bc124caf3997c7c987a50554c908c7bfffe2243ec874fb2acaa06dcc19c984
File Path: C:\Windows\System32\WpcRefreshTask.dll
MD5: 303c99476de5052d1b2f3b9262abdf91
SHA1: 590284efc53a29221cea85b023b46976a5ce44eb
SHA256:d682ec396290e7553797849e59dd71ca34426ea6a388150c4261b1e1989edd1a
File Path: C:\Windows\System32\WpcTok.exe
MD5: 3d1fbca4802455971786989a19f599b6
SHA1: d58158aeec13675d9a12f701b51995491de5f90c
SHA256:94b1cd757d976f22ca01c8ac99c0b5069fa8b1f0339b2ee026170310b231b6b7
File Path: C:\Windows\System32\WpcWebFilter.dll
MD5: 10e855bf61d45839398b895bc682c5fb
SHA1: e6bd58e0d31f99df409f8494fb2232d1ab72995a
SHA256:45a009b5533d4575d8a17ee6ab7297b34a8afd772d2d954748e10d2df34dbfbc
File Path: C:\Windows\System32\drivers\UMDF\WpdFs.dll
MD5: 737959850123cd10899f41f702c2d97c
SHA1: 17095e73dba6da991cdf1880fb17292ab510dc90
SHA256:1101a129e86d464bf0438d6aca66d513b8d6bd43a09df669900f4249fe08f5f9
File Path: C:\Windows\System32\WpdMtp.dll
MD5: f1066497630f8919d97e044cd67b4d65
SHA1: a6e90278f4a08d0d2fee1e0b88d29c877188a07b
SHA256:a3688373f36a269a7e9dfb7cd4a4ce6bcc3393fdd4981af61255c9cfa0f06eea
File Path: C:\Windows\System32\drivers\UMDF\WpdMtpDr.dll
MD5: e9e6eba52046d4fc05da91ef6c86d3a4
SHA1: 02bb602194103db1b714bc3a2be0c62e1b0d2679
SHA256:83bd62d9144a08111c6abe5f8115a6e9e16a1215d25462e4a0bab22daf7197e6
File Path: C:\Windows\System32\DriverStore\FileRepository\wpdmtp.inf_amd64_527d350cf4ce5efa\WpdMtpIP.dll
MD5: bf61cd1d3d89fb7bbd797d52d235eb5e
SHA1: 5ba578a53b85b2c0ce1c9e49a36c32028304ff37
SHA256:05ac6303816979bce954ff8c0dca196d2b87924af1f7a8894e7d950ea2cb2561
File Path: C:\Windows\System32\WpdMtpUS.dll
MD5: 52d34784a6bb636175ff552676f763d8
SHA1: 30fb404a7c982c4af4171a91db326df0974d7774
SHA256:286c6934ca0b16b7adb44df900feaef6341106b4c9d261f24338532a1e71bec5
File Path: C:\Windows\System32\DriverStore\FileRepository\wpdmtp.inf_amd64_527d350cf4ce5efa\WpdMtpbt.dll
MD5: 41b2c2349a70e6a28ce383ef686555e5
SHA1: bed6c1999dbac911cd2dc72dfa49c78324ea5592
SHA256:070cb751123c5cfe928a1277380ce51ac924d1397e052ada0c31383498a1fda2
File Path: C:\Windows\System32\DriverStore\FileRepository\wpdcomp.inf_amd64_5c27f29a2f87b820\Wpdcomp.dll
MD5: 3ed3beef1f20c1f350eeed78e13a9f03
SHA1: b352d99bf9d3fe769fbd04492ea1bfe783f353c5
SHA256:59e919c76a034a8e39ccec1ce8aa035cbc20d636bf3cad3322d16a2df9f23c59
File Path: C:\Windows\System32\WpnUserService.dll
MD5: cb0d6ee2f626d1cfa33d57530c471864
SHA1: 44167512a2f989b27ef98a067dded62bae6fa892
SHA256:ee219ecbc6f420969af247449df5cacfe99f8b6b423b568be58b7172022f0c57
File Path: C:\Windows\System32\cAVS\Intel(R) Audio Service\WppLoggerDll.dll
MD5: cb8dfa1e3d28c6e45e0aa3c7094973d6
SHA1: bff5898e455fddcbc170d7ff8126e5420f902990
SHA256:4e5c751b2a85a79009f99f9569f776cdebc20e88433089ea0c3b49f3718ac62b
File Path: C:\Windows\System32\WppRecorderUM.dll
MD5: 5c9ffccfe8368fa528845665463e3591
SHA1: c7bea8bda9dcb0f310dd30ed09ccd2f3cad14f29
SHA256:be5a52b8554491aeba2901334ad378c60228ef580d3ec84be29d332d242d2c38
File Path: C:\Windows\System32\migration\WsUpgrade.dll
MD5: 9d99b0e88cc4eaa43141dea9e31ed3be
SHA1: 442e48476650e97cfac8e8088a7315b9804be0c1
SHA256:061de26f44da62a17eecb71f078ef90a9c8784e7c58500984314c74b32c12e46
File Path: C:\Windows\System32\WsdProviderUtil.dll
MD5: 34ec9ed8e99c4cb7f6cef1bc07bf9f13
SHA1: d948d97dc23727fd7ceb86a21df09d879f9ae2df
SHA256:6114577726b55c20e41758075975b3506399bbfd048e38370334d914c805cc48
File Path: C:\Windows\System32\WsmAgent.dll
MD5: 3ae0e6929194abaf2698859b7fc2696a
SHA1: b868e8aaf0051da5f6f761e6ffb325bfd83f5a94
SHA256:0322870de2d615884dd3e938f00596815b34049abd751fb9bd06d540109559b5
File Path: C:\Windows\System32\WsmAuto.dll
MD5: d8b5ef2407e0aad37e737e057be57ebc
SHA1: 5232d1a3e84c01c0035ba218766927180262bd26
SHA256:c089e4108a4d5670663bb003cc762a03dfd615c64a2f649fade003c0b1e51e21
File Path: C:\Windows\System32\WsmRes.dll
MD5: d6c792c90b96dcb2162a1035f105a29e
SHA1: bfa8f24fc8a39d5e59d8de6bc80c7995a78ad2aa
SHA256:84d4b6eed0b230958c5ae24014f37e63c74762ad8b6b9e0b70d059e7ce5955ea
File Path: C:\Windows\System32\WsmSvc.dll
MD5: 2f38f086125a86b0905c522487669a7e
SHA1: 22e5f5ae8e5a61f0cfe92df93cade4499947e55e
SHA256:99d92f7d3ba19c912e0e71223f32a96de79660dc08dbbdda0affdec640e6097e
File Path: C:\Windows\System32\WsmWmiPl.dll
MD5: dde345eaed7c1dda67e98601a9611cba
SHA1: 6ce68ecbbbd1952d7f7c21f8aef486d3b7ac1323
SHA256:0a6d2000d7be434da90ffe846bdb432cc4e4efadd2bc074893e70599ea6102b7
File Path: C:\Windows\System32\WudfSMCClassExt.dll
MD5: 2ebd43951105235d8c9d56f74c1f1c98
SHA1: 78d75988efcdf5e3f0a89aed03cd42f0a35210fb
SHA256:4a756824dbf25841a9f8809a1ad50506541e2075251131fad494e12dcb93848a
File Path: C:\Windows\System32\WwaApi.dll
MD5: 87319c5d5aa3f36fc3a4d14ad2210b0b
SHA1: cf4955148bb33b029534286cf0682010f3bfeae7
SHA256:8a78cd78071f23cd35397194c06d23063b260437ffb391829ec8de0f0b1f5128
File Path: C:\Windows\System32\WwaExt.dll
MD5: 6e329d5e12b5953dcabd9e9e8396de17
SHA1: ea33936e51e65fe304338346a3cc0f6af4c32b25
SHA256:4330db30706bc7bbc04a32f6dbceb30d0a44ff19fded5995cf25d691635b74c6
File Path: C:\Windows\System32\WwanRadioManager.dll
MD5: 6db1d9ce971c8c96122c9d0681a0a33f
SHA1: 8578dade57fa67a6d61835b09e130d39f1bd0c84
SHA256:46e8624816d5e52863eb5882cf7b8e174c5f1f0c92d40545fa4e87f46da25c6e
File Path: C:\Windows\System32\Wwanpref.dll
MD5: 6531fc433f1e721643fc6f0e652846c4
SHA1: 6d96be7e99dc1acb38250b678f5455c6dd38a9b7
SHA256:9ce4fcaeda9f0497f2f21edde83509c66b0eece781fdf40459afdb865d2839e7
File Path: C:\Windows\System32\XAudio2_8.dll
MD5: 930547a75d0c8ab9db640b400b5ea2c3
SHA1: 89a30569bc9af0ffa27bbeef29d0e4061de17fa8
SHA256:758de3275e114dbbd834fba0e56ffe84085579740398f8911d616f273534a5a5
File Path: C:\Windows\System32\XAudio2_9.dll
MD5: 012784a1dfdef2de189ce5181bc4c9a3
SHA1: d800af58ec686c424c706b6fca7ba80b08da4849
SHA256:6c09e98d384450910b4a8f37ed607f9cc682ca51a27ff546a7f3d1fb62721740
File Path: C:\Windows\System32\XInput1_4.dll
MD5: 3b38601c450d38f14bd9ee43eb1e64f5
SHA1: 00fe510eecd4f31fcefa4c962c1db2146e23bfb8
SHA256:cc119f987bf33731fcd22c3a9bbcc675f31d80593a4c26428b363d6eedef974b
File Path: C:\Windows\System32\XInput9_1_0.dll
MD5: 484aba28bddc57fb7ffa48de45960c4d
SHA1: 5ee424085ca60b4c0f551452bd1e4879d6f56c51
SHA256:abe5a8f95f3cbbe2f547433c1b3737f1cd82fccbdb2417674596ce8541df548e
File Path: C:\Windows\System32\XInputUap.dll
MD5: 452a1ffd6495086cc59c848152fde468
SHA1: fc1d0a4b38009562863dd9cc8cbb158bc5d5f5e9
SHA256:aeb11e75201626f048e7de9d3840e9870ba15fdbe449dd00f06309de6cd731ef
File Path: C:\Windows\System32\XamlTileRender.dll
MD5: c13d7c03d36669f6d3e6640822a82594
SHA1: ff03bde268c7b93027f51eef93210caaa4d9d6a6
SHA256:0bd4abeae965b7193be8a7dc2671119d21d12662834b785b0c83591d09cf536a
File Path: C:\Windows\System32\XblAuthManager.dll
MD5: 63f840df1ac3e4554443223c5df19d6a
SHA1: efdbf06a6481467db24da53f888608f15892bfce
SHA256:02da74fdce2c0e322c147b6e62448093e972c1168aa2c4b1d4b49f74a50b3553
File Path: C:\Windows\System32\XblAuthManagerProxy.dll
MD5: 1c91c0fa1f5ef60c3c0b2bc676a04fe1
SHA1: b1300f8bb0540382e2661b6ab40c5ff9abbac47f
SHA256:369ff296adaa06f8cf43798b1bff8e6d859a229788a8586ebaaae9cf329b942d
File Path: C:\Windows\System32\XblAuthTokenBrokerExt.dll
MD5: 3f35556b648c846fe9ab0b0f4e2299e0
SHA1: ef68e4d84ac276357ba81ffa962d683e63641628
SHA256:90dc5a0b19ca1b74904099a63a1271a49c49246b43e6ca2c6881b9bb548afda2
File Path: C:\Windows\System32\XblGameSave.dll
MD5: 18c2691ea704deed959d258b75269c46
SHA1: 361626c901fbb0c28ef76c39030e4966bde117ea
SHA256:9e42366b1b9c9ad8f13ea290b457911895b64ced784e855d8b6c329501389a1b
File Path: C:\Windows\System32\XblGameSaveExt.dll
MD5: 6e22fee2985491f1878f46ef3fce90b5
SHA1: 7cd742846894aa04bbc6e4fe2a14178e87be9c7f
SHA256:b4df62fd7e3f939aea7022c62a857fccc7ec1515eb26b2e8e67dc11e08b2858f
File Path: C:\Windows\System32\XblGameSaveProxy.dll
MD5: 1378a1cf4b3c70ef22f5bc8fa4439e59
SHA1: d38dc3b18bf1d03b8f805e6d9dece924235f9a99
SHA256:162b501da323626c06c35571e53b5843561dbf0620e218cca29f656efd098750
File Path: C:\Windows\System32\XblGameSaveTask.exe
MD5: 3ddd316e75fe98ae4b99a228e5179992
SHA1: 309e4889a821d70491bc58d5a07b747793386faf
SHA256:9dd54035f3c1c4a1070cdc030b6560134adf031b5e9b592824b76fbff5370198
File Path: C:\Windows\System32\XboxGipRadioManager.dll
MD5: dd039f9f8114b910f05da4ea1d29fff6
SHA1: 2b469df25580b1ec2fda189fddaaf00e13641934
SHA256:aff97de16d519d7dd31ac1fafb0349f003901f94f4eebdf2493855e3c79967fb
File Path: C:\Windows\System32\XboxNetApiSvc.dll
MD5: 1c6322cb00f0e855c128d96f9a0c5894
SHA1: b0cfcc03a63df54571f5a49f40910923868b61cf
SHA256:0bc42c3b0fedaacd8d75d5dde3b0b2e70aafe1cdeb2ba37e450e4da0856f7cdc
File Path: C:\Windows\System32\XpsDocumentTargetPrint.dll
MD5: 22c5108362affd49c0c4e334d86ceabb
SHA1: 3c3f44c773ac84e89d4ab710eaf02ed004f1404d
SHA256:e1e1a34124c50fb53ef6d700e2d7c2d2337a8e85d611b734cb7320911b3221c8
File Path: C:\Windows\System32\XpsGdiConverter.dll
MD5: be44063c181e3dcde7907b5a62417340
SHA1: 5a160249715ad056f2f1a3dacbba98a6e360f94b
SHA256:bd24037b17e37b3c7724f051e4cfdfddd54d8dcb2f38f07cd72a6275aaf40fb2
File Path: C:\Windows\System32\XpsPrint.dll
MD5: 284cc2cab570ef690af0e987d76c6f70
SHA1: 05e821e5646ee4e74b04ea9e58d71cabfe6e456c
SHA256:1e08c64b1f2e50a87a14b279d0bb14d2a2e37b7abc2757311a245eee5d65282c
File Path: C:\Windows\System32\XpsRasterService.dll
MD5: 25f6d1889d374f3f0c9db1c00d3311dc
SHA1: 5eb4429b265b5909f1745a518f126d2648b63167
SHA256:a9ae8a2751ed6465f70be55fa1d747f020e26bcc42d91105d93ffbcac6903a67
File Path: C:\Windows\System32\XpsToPclmConverter.dll
MD5: 36bc5d13178fe3b1bd7138dab3e7ea26
SHA1: 846ada7c3b05a37bed07371bce217630c9ca76ee
SHA256:9a929d9e8cec1c2c8381962357c4349c17cd9df47b5d718bd43f1e081a2bc466
File Path: C:\Windows\System32\XpsToPwgrConverter.dll
MD5: 79f0c9e114e7563256c6e906f18a444a
SHA1: 219d0780caf90a752e298e24c082012af2b2ca6a
SHA256:89e3ad2e632c104224d43c050d57c8d5b1a83698b41a9e443dcecb22f40ff394
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvCamera\YAMLFXC32.exe
MD5: 80f691b48426828913b45f81b5236e80
SHA1: a26d56d024a770e22d6669f50efd18b349bd8195
SHA256:fefa5e5e4da8e8636c1dfde94e26d778b41a469c140511be692315f6a2fc5334
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvCamera\YAMLFXC64.exe
MD5: 7cc3d2cd35445df97d75ef3973e36b67
SHA1: 0dd64080e1cfc4258e8d9b242f35ef7239d41b45
SHA256:f628586ec8ef2bfe6ca608a76d05369c9b2c63dd73b0c5d94edbb717ab58081b
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\Display.NvContainer\plugins\LocalSystem\_DisplayDriverRAS.dll
MD5: fbb13afd57a346c4c110857c2ff4294a
SHA1: 5f21ed4ad97062a976c4b3c78a4cfdf379862fd0
SHA256:ab6993f7622c2280b184cca014e6ab40b33e107a9a6ea38571de35dd7dd08fcc
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\Display.NvContainer\plugins\LocalSystem\_NvMsgBusBroadcast.dll
MD5: 7e8f6da13c9416ddfbf008db2634b8fd
SHA1: 7fbc5bcdca0eb56bc2277602e02a9a7da115a321
SHA256:bfe6868ed6fe8d2123be5591a3fb9d308435568b2f59dd2473851f6b44a8195e
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\_nvngx.dll
MD5: ee5f8d6235105193678de1356d5821f9
SHA1: 70eeeed39dda133810d2b0d78c968c36d843103c
SHA256:278d2db8390b3ddb6a94555140eeb97fcc657671dd19326e076914bd294770dc
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\Display.NvContainer\plugins\Session\_nvppo.dll
MD5: 72efde81fe334ca00b17a0669a33215d
SHA1: 1aaa2cf44173ad73486d03c6cff4e3dc76c48229
SHA256:673f0ee424b603ef33e09c7b4dd637eceae93a31a09b364db11c8b406afc9629
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\Display.NvContainer\plugins\Session\_nvtopps.dll
MD5: 3a43bb5efba5cd9120e741903d503205
SHA1: c3b714259c28bdc16922ffe0d73ee40b61d7d415
SHA256:2bcd4857cd9d09b233eb458f075ba7db46da74f595a7a63964690c1ec8775719
File Path: C:\Windows\System32\aadWamExtension.dll
MD5: 417cbae5175119ebbae94a07d67fc407
SHA1: 83df3fe599c95cece1989e2f09e073b0caaa8fb6
SHA256:578b0fa1964f09a0e44f8230742e7994a310b6082360a6aa4a6d6c64f3e49ba1
File Path: C:\Windows\System32\aadauthhelper.dll
MD5: 68d60e50c1b15d4409d29fea0bb2c425
SHA1: f8cadc534d5f96c6eaa107ca9eabd677dee5b397
SHA256:c895a5df0c7542dd28f5fb2f8ec4ddc6767b2bc37631cc276a1abb0b5965ce65
File Path: C:\Windows\System32\aadcloudap.dll
MD5: c6bf1bd6e1d8f9e8c2ab6c06fc5b8503
SHA1: ebd0d8cadcaebcb9a6b6861fcfb4026ae92ada5d
SHA256:30d3ae4bedd82056e64cd83d401c6e021dd2f2241cb6c7273a8a77abab8f027a
File Path: C:\Windows\System32\aadjcsp.dll
MD5: e6168b1008678dc49c7474704ff17896
SHA1: 8ef133c31e59e2642784fb2c1ee9066799e95f95
SHA256:e8caabc9326543ed027770da86f5279f2ed86068a903037433a57c592b9ed7b5
File Path: C:\Windows\System32\aadtb.dll
MD5: 05c6bd4a98ab2174a151a87ea99828df
SHA1: bd85aba0f25d8d6efe4d83f57e3458372a253dfd
SHA256:2afef33388ae69024d9a9acbbf8083deada5982dcc5000c677b9fc1d5820656f
File Path: C:\Windows\System32\accessibilitycpl.dll
MD5: f316026e08074300cbdcd8453bfd3116
SHA1: c7494558e98e42930b83349ea816963147242fba
SHA256:a28ef80b49f85f95f929d5c40245b05f95d58bb672764c3539ce69098db9bcc2
File Path: C:\Windows\System32\accountaccessor.dll
MD5: 84c18ff7903ba503af1d82ff3da26ddc
SHA1: 416397c3edcac631cb884b441f946d061cff618a
SHA256:886375efd78925159a73dc6ccaa10c8ada5b7042449cba34f697da2218af46e6
File Path: C:\Windows\System32\acledit.dll
MD5: 7c2b65e0756e0dc59e0be5d9efd25da0
SHA1: f6303b5239dd8bd5153e7f7c3593cad714462373
SHA256:b89c8b36a4af02d835dc07b7a905e1a3f95308aac92f614810dd69eb71d9fffb
File Path: C:\Windows\System32\aclui.dll
MD5: 9e12cf3363f8dfc2b2624c4171183eab
SHA1: fcf3c863523ac59dd9e1a030440a731a44b09194
SHA256:e39cdcfd6859ccb705879cf9088522b43941db6ef5683d5719bdaa93340c35a4
File Path: C:\Windows\System32\acmigration.dll
MD5: 46361ee0dca4f73dc980f02b1444fc84
SHA1: 4f1108d3546709d22a29d4c37f24c24af181c057
SHA256:4b9e6e37c948c524bf9fda802c3f1197ab0e1fd5d0318bba82ad771b64d48f70
File Path: C:\Windows\System32\acppage.dll
MD5: cb6e05c15d2a710a8bed55a338fa8452
SHA1: af17922bf0a1f975ae4462a2e6c8f8a5019ca3bb
SHA256:1d5f908a58bb924175134f333b5ca3443fde940c85e44072545a5afbcccc0416
File Path: C:\Windows\System32\acproxy.dll
MD5: 1e997cfeb32f22e84b4ea3db2ea66b56
SHA1: ee6b0ba9a5d7b73ea8148762c49d4c2cc2519cfd
SHA256:b8af48fc5dc8371d6b00b16029e9ab9027e2da86fa6d8dbda181df464226a3a8
File Path: C:\Windows\System32\activeds.dll
MD5: 26bfff5c78a27a82c8faa98a585e5e48
SHA1: d928c4855e184358c5627fbe47041f8811854b0a
SHA256:76b51e23c0b0768500cc45bf3832e9464d941f8cae6052cf31ed97df2d3ef5c9
File Path: C:\Windows\System32\actxprxy.dll
MD5: 574aefefc66045c6261bdbff695787c0
SHA1: c8256128f4d1b7d6eaa8ace423f7ae7be3c9cedb
SHA256:83c88cff21d10e7b482bbba6b51bcbf4cb68b141fa625a7db958d3e54a7f10c6
File Path: C:\Windows\System32\adal.dll
MD5: b8bfd3cedbb9fa88c6d73c27e82faaaf
SHA1: ac1f20e7dd6cd606b541d63cdb464217f2750764
SHA256:bf6bc870cb0c884759d983e84926a7560c90c1b31d60987107e09651655b5ef4
File Path: C:\Windows\System32\migwiz\dlmanifests\Microsoft-Windows-DirectoryServices-ADAM-DL\adammigrate.dll
MD5: 6bf5baaa74f1b34591a5243da046cac1
SHA1: 142b0fb161acb7390235de38d1df0d7fc7f10bff
SHA256:880cdc541a19765d9586a6806971c4c4597033122158da8542754973b3fb15b0
File Path: C:\Windows\System32\migwiz\replacementmanifests\Microsoft-Windows-DirectoryServices-ADAM-Client\adammigrate.dll
MD5: 1710420a18729242d1c4100554c046b1
SHA1: 170a61e6700a84d5f69aa7c2277048bb24ab4fdc
SHA256:996c568a962cd727cc957f0cd83df250af46f803ea461638e5f2bc7362778f90
File Path: C:\Windows\System32\adhapi.dll
MD5: cf88982155d10e9fe3230a61015cc8ec
SHA1: 7fd254481511b9ca827e9aedece59d6ea2b06895
SHA256:89a363b639b6542e78171a9153c152513eee92d0d2549a17e25cf9828dc6f030
File Path: C:\Windows\System32\adhsvc.dll
MD5: 98eec07a06b0570fd8a29c8df2f0f4aa
SHA1: b25ae52746e18d93cc3542ffeadb23d4da8ecc57
SHA256:a111db2388bd290c91f3776d84fe5f049587e81393d3d6383fd618fe30e1a60f
File Path: C:\Windows\System32\adprovider.dll
MD5: 107f29505a3631d5f093fc90d0b151f4
SHA1: b8236615a8524b5daac83bd9094fa391d9b11f2b
SHA256:31c4a155e70c8ca2fc843ac1f72ea3dd889c143865f09bc495f7246f413df667
File Path: C:\Windows\System32\adrclient.dll
MD5: 7cbc73385adcf4ab114ef84cfb0951c2
SHA1: 923d589ac2b6204771ab4804445926c60b5305a7
SHA256:61ca33a247b41e9136ae9701cb0dd5f468f343e484402c31d609d328ee4717b5
File Path: C:\Windows\System32\adsldp.dll
MD5: e6fdd6398054942ff85f545ae6bd2be5
SHA1: 593a4ec166e3a0ad28a84e3e77443343610b6325
SHA256:4d58ae49d539b371f843d548cd29fe29f3aad64688d12e8f2a6509336ec57d85
File Path: C:\Windows\System32\adsldpc.dll
MD5: 77aa0adecc0cf25462eb7716b2ba5190
SHA1: f64c8c06f967914a00a588b984e8ba457aa6ba99
SHA256:bad9ec45b67583cad9c2c8e607d6cdf274a1554aea4e8cccf814c0d326d2f8f3
File Path: C:\Windows\System32\adsmsext.dll
MD5: 594bdd08a448b2a0c821865a4d643781
SHA1: bab005a17e4507d0e63fd852b4fb9d1e2c0f103c
SHA256:bf93d794eeb71474d8d0bf0d3912479560685c32146ad41dfc5e0e288fb6e857
File Path: C:\Windows\System32\adsnt.dll
MD5: 203ab05b635ec589c52f57fe3294ebac
SHA1: abc69deb12f7b02064f9a81b181d8ed1af2ea74b
SHA256:db746a543c7fae8f327fbeea57e67f886032a4cb40a985dbf7c97e605f652b8b
File Path: C:\Windows\System32\adtschema.dll
MD5: 36f089c9c160f74338bccf68f4e0d638
SHA1: fb0fe3366750383cdfce139b6385c22f1dd748c5
SHA256:e9cc69db4d74c1407cd4ed0f4543be49a6ee9f9892cb557c8dceadd4b8ada0e7
File Path: C:\Windows\System32\advapi32.dll
MD5: 0ea8a48b4f5e3cf768bc4c5b510283de
SHA1: 854ae8159072e0cdbfcd264de7b8533ea9b74281
SHA256:ac3a114229f3213a2cd78996d8ef5f3334fb61e9327cee581eb7fb89145cb9e7
File Path: C:\Windows\System32\advapi32res.dll
MD5: 56454bed3820de989b4b7342dfbc8fed
SHA1: b9c224af84996edeb5c4697e92b58f9384206a6b
SHA256:7588b9c5d6412a759cad5670c97a3e702419bc7199cb0e28091d6773692a302b
File Path: C:\Windows\System32\advpack.dll
MD5: 28acecb01fd246d7163832fe2103d4f0
SHA1: f925b405bdaaae094955c8b08c7ace3cd6835d91
SHA256:3c9abfd8ba107b301af6ffe9eae6f3574283756a647e392160248d1ff0f95db1
File Path: C:\Windows\System32\migwiz\dlmanifests\Microsoft-ActiveDirectory-WebServices-DL\adwsmigrate.dll
MD5: e7170a72d2ee8b9defec2c694b0f789d
SHA1: 11c078b9258401e7c0d176708de2c334a8851f87
SHA256:db6480b62c9314b14ebba52b58009fc77baa63a1f6276e98e55f4668e95c2e4b
File Path: C:\Windows\System32\migwiz\replacementmanifests\microsoft-activedirectory-webservices\adwsmigrate.dll
MD5: 80dcfa3c579d1c313272c14b30036678
SHA1: 1c746d5a5e995a2c6c3ad021b0ccfd8b6ec49e0a
SHA256:7c6c79924ef115bcb287962a01fd127cbf622ea7a8bdda40275505b494e374e2
File Path: C:\Windows\System32\aeevts.dll
MD5: d798da6828adef05ee100d920291a7ed
SHA1: afb24917a935885347ea49989318b16b472793e9
SHA256:cf51b001acc1810a9231bd4f60d85680b4cf9716c2c3bd499e7a67467bf5e94d
File Path: C:\Windows\System32\aeinv.dll
MD5: 8a48ad3c832fd04ad2c67c7094e93e75
SHA1: e388eb68acf706be90a3c325f37879ee92c3186e
SHA256:114d908de61f312ab9665e7807d202f27e8711879b34a81215b4d8efe4d8270b
File Path: C:\Windows\System32\aemarebackup.dll
MD5: a4912e80cb167eef7bc59ca212264c52
SHA1: 191a6e6b90ea896babd1f9a00f1c6bc6eae63072
SHA256:c6c02747365ee26bec8f8d1b4115a91f750e86c874fa2ddbe0c8cbeee937a793
File Path: C:\Windows\System32\aepic.dll
MD5: 87a68c5adcc3a3c62e0851dfb480f526
SHA1: 1739d85132b3abc08ba4de70240945356063db52
SHA256:7f146d852f6b87c4c8c086043325bd493135682d12cecd8f8a5d7b810b006196
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\aesm_helper.dll
MD5: 4900f6542aa99d0b00d1cb211afaafc6
SHA1: 7ee02fa243dab7eb6deced25ee24ff6b6eec3672
SHA256:24b108c9fda1cf1aead1419d6b07e6373e26a1ab39ef1965ae697af88cdf76ab
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_d372a4ea3b959b1c\aesm_helper.dll
MD5: a6856b5c7401020498f282d6f1f0a090
SHA1: 97d92952603ba6440fcac4dd1564b8ae0da96e1e
SHA256:3ac80da59e2ab8a96b44e83b50f0b293f95c73ab614c6dfde55f8678979ea830
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\aesm_helper.dll
MD5: 8b70d0af23963a64ce647a8f2f1f2871
SHA1: b1975b11277e7f9315169309a773af940c293e35
SHA256:56f1cc4f83618550977be56a1bf2807e6d17875773349eddc0a58e7361df8adb
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\aesm_service.exe
MD5: 7b359659b0061bfa20474afb078f1339
SHA1: b397590e2b99a9749d80eef794a4f957c9b56778
SHA256:c8fca12cd55e6d8c87071126492f49ff48d4966cc5510a0c672e0e57be9bef40
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_d372a4ea3b959b1c\aesm_service.exe
MD5: 8309743b0c5f7f68e25e3650c4071dc2
SHA1: 3f825816ff43657183a32ef5bbd3bc2e451feae5
SHA256:34b9a9c1413c2cdfb50e47d092ad55937272b2e638259abbe1a4833fcf73b9fc
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\aesm_service.exe
MD5: 8de3e57efa4c850e78196f8e4787aa62
SHA1: 2fb5d58642112029b8567fe98faaba57ae664e8e
SHA256:1cad0cdaa7dd12c8833706521a8be7718effcdaab9a21493cf9106c15a201559
File Path: C:\Windows\System32\agentactivationruntime.dll
MD5: 8f1b4f425d52d86e89481f305fc5d0fd
SHA1: 2126665554e8555b69348391778e479a94d5d13a
SHA256:ca03d7c652d1f9b9d4687804bed984fa2eec9d4ba6dbc1a09fdd199360fc34db
File Path: C:\Windows\System32\agentactivationruntimestarter.exe
MD5: eb9dbfb823c764210dbe250e4c7ba3fb
SHA1: 8a72ab17d91a48bae1208d5c86a3e8bdd4f88a35
SHA256:2ff945fe543eb27df50b675e5d5407808ca75918481596698751cb8abfbd0d7b
File Path: C:\Windows\System32\agentactivationruntimewindows.dll
MD5: fc7df4a5ac6c195a3021da8ffddb59d5
SHA1: c67b8e0a5c314422ead29eb483c9df52127ed5a9
SHA256:29588c1fd15e7df9ee9b9148f1420280633fecf85c6c6e46441655c938a6fad8
File Path: C:\Windows\System32\aitstatic.exe
MD5: 7c4cb74c171a64c7555ea5858a5f22bd
SHA1: 2f3920fb1d357d416e671975f2c71f61da979fb2
SHA256:c7c9e072161fe239e3406e5d45b85eef9b1e0795a4f8219032fa14ec765accfe
File Path: C:\Windows\System32\alg.exe
MD5: d002e288353219e3f1d9253c36effcbc
SHA1: 04cbc9a3b308f31366edad7ecd730b4842d526f9
SHA256:3c3205b21d5c6c086e48db00052cb9ccb9efb211d32dc506681c38d949c1dc88
File Path: C:\Windows\System32\altspace.dll
MD5: 7a56be269cb3adde7ed81b4d00d50dab
SHA1: f20b04f96cf285afbd2a479e31aeba481aa4896a
SHA256:2e63f6ffd56599576a2fbbf42cfdef1dd2ae953cc144d2033962f1a1eb534f8b
File Path: C:\Windows\System32\amsi.dll
MD5: 4933108bd5b3219f74ad807dfe8835ad
SHA1: 347368018e1daaf4f52c9a4119526313a82eceec
SHA256:66f7a134f6a4d9fe63dd7d6ff88dded5796e4d5c7e33ba606dff4d87d9258c0d
File Path: C:\Windows\System32\amsiproxy.dll
MD5: 58d272a1d02f23d523d67a78b6d7ebe2
SHA1: ffb1eb7ea98d4f76acb30f1d998a8deace0505ac
SHA256:0f14f08c7ef38cefc7ae9ce655225d59f0a3c8953cb961876ad857557a93fb7e
File Path: C:\Windows\System32\amstream.dll
MD5: ceee233580e0ec7bca9407d7fe56f014
SHA1: 2e052952472594bbe45569ae5dc1be7239b43bdb
SHA256:6e45bb5204daa177c8e41c69785b62a2183c742830a617f7ea97b2a25f029ca0
File Path: C:\Windows\System32\apds.dll
MD5: c32bf672c0441fbf097fe119582eec1c
SHA1: 92ffc78f2d27a0ed77c7e263d422c98fa5878451
SHA256:e93f38f056cf29efa1246f4065f1a12d8b21a5016e0708dda9bcacae741abbac
File Path: C:\Windows\System32\downlevel\api-ms-win-base-util-l1-1-0.dll
MD5: fbbfdba614afc9b3b8a9561c0cc7fab0
SHA1: 7e3ee04b0bfd4e2444e69f08b70c2212b5c1513f
SHA256:475a449275314b688d730a94383895fe32263126a72241bf5d9fce3715a59da7
File Path: C:\Windows\System32\downlevel\api-ms-win-core-com-l1-1-0.dll
MD5: 52e6a06268df219f4e519477fdbe58cd
SHA1: 29d54fa312881d23e0366fb7618b11388221a1e8
SHA256:d55d80387ce756b3f74cd23244b5020f54ef90fa958bc45c6ab078cd2af2803a
File Path: C:\Windows\System32\downlevel\api-ms-win-core-comm-l1-1-0.dll
MD5: 7e04118ce1f4ccb409e962aa77f874d4
SHA1: 170dab6cdaf97d0ed8c3a2e2e930fac72cc1b034
SHA256:d73c83c4640b8dc44f19707642a8f863d9fc7f0b7bddd41c333ab2ca3dff8cbf
File Path: C:\Windows\System32\downlevel\api-ms-win-core-console-l1-1-0.dll
MD5: 03a223af1da8e23b936631019c097a04
SHA1: a4a96a7ed9f09ddb3add97f91123017bdb2534a4
SHA256:397486f5f0fa11471eb89fc837210abf0b25871607c7bb552e6d58acc92b7d72
File Path: C:\Windows\System32\downlevel\api-ms-win-core-datetime-l1-1-0.dll
MD5: 5f6287f8ccf194d73a54a971da906520
SHA1: e6dfaa45adb0a92a5ca54c06feb296bccda03dc9
SHA256:d72724ce087bb75333f3758aca9fb05e14c0a81cf2a11bf9220a3461b523b35d
File Path: C:\Windows\System32\downlevel\api-ms-win-core-datetime-l1-1-1.dll
MD5: 146f5ac9fbe7c7eebdf7ec9a7a408a21
SHA1: a807865646e5c39409aab31148cf664511c0bc51
SHA256:24c83deebffbc55a329fdf0e893ced6bf626d0b8e4fab9c0424ea393b8173c67
File Path: C:\Windows\System32\downlevel\api-ms-win-core-debug-l1-1-0.dll
MD5: b46679ead66350f23baea3e5bbed26e3
SHA1: c665b9f27c9dca2265238f3fd83c41858cbcb3dc
SHA256:0ae6637ffd04b6d8bf8df254d95ef23acc8faf5911fa14edd69ba2c29ba8f185
File Path: C:\Windows\System32\downlevel\api-ms-win-core-debug-l1-1-1.dll
MD5: d81a0b65e17daf4879d3b44e070f9bc1
SHA1: 3b20cd9e266fe5af6f1a7220286129cfa9ebdad5
SHA256:f1f9846aa0554c32b0442a3ef5440d16d9221f8fb7402a00ea26ea276ed4c8b5
File Path: C:\Windows\System32\downlevel\api-ms-win-core-delayload-l1-1-0.dll
MD5: 7dd4f7c35479bd295cdfcc590356f055
SHA1: 2d9d4860d8510b348159f774fe97a04faa7a448b
SHA256:a1f1bb36551f8469b068203673c298b4a7fd0f4bad967d6a15810ebaa3e9f2d8
File Path: C:\Windows\System32\downlevel\api-ms-win-core-errorhandling-l1-1-0.dll
MD5: c70bc6950514139de25a7bf78d01cbf5
SHA1: 0a325dcd1f3ab24f5cc4f9ce2856be8553af46ce
SHA256:e12cc29187652d8162e93b7e178281c05566dc581b7922aabe85077855665984
File Path: C:\Windows\System32\downlevel\api-ms-win-core-errorhandling-l1-1-1.dll
MD5: cc7d83a08ff9ee63f02c150dd82361f1
SHA1: 53daa317613a61adfe72cab0af51f6e7b34ad28b
SHA256:15e0dca7ac18f4b91f4530f2d88b2837f5cde2929623a7218323d9dd6bf22878
File Path: C:\Windows\System32\downlevel\api-ms-win-core-fibers-l1-1-0.dll
MD5: 82c2924e57eb2ce06436bad4c52d2259
SHA1: 4875c1ba30398fb006f3469ca44304df58068f8d
SHA256:4fc85a8c0702cc1735168c19df4576df9781422788870f60a35bc92ab435b9ad
File Path: C:\Windows\System32\downlevel\api-ms-win-core-fibers-l1-1-1.dll
MD5: 88eb90167f6ab6b608191faed33917a4
SHA1: 5579be793c82998d1d93c6a23db53d647633e845
SHA256:3a7a0e70e2bfb555cb093e1584cad4610d559db25d60c2982fa01958e565f514
File Path: C:\Windows\System32\downlevel\api-ms-win-core-file-l1-1-0.dll
MD5: e8c76b0cad0f6a1fd8275bf23d293f92
SHA1: b9abe59983237199e2a1c88f070f024cd376be46
SHA256:926b60354d988fc19e73c710229c46acd32d42834fadff2b1fc5cc9bfd68397f
File Path: C:\Windows\System32\downlevel\api-ms-win-core-file-l1-2-0.dll
MD5: c7b0dcd9935da9bdc9b390b4b0a9abac
SHA1: a38eda8861819b9d6df0fc69a3664bd05634d884
SHA256:e04ec04a6c3d0dd77918bd671ac0b14a00865cec66ba995a1e369eced65ca89a
File Path: C:\Windows\System32\downlevel\api-ms-win-core-file-l1-2-1.dll
MD5: ca2f72c1d65b915f252f9945cbdec989
SHA1: 425b0dbcca10890419b7187af65f2a12d1eb35b3
SHA256:1ba73c3eea9b48a75547d9c6c1488316f5765e6d4297937c22a5050c3297ff09
File Path: C:\Windows\System32\downlevel\api-ms-win-core-handle-l1-1-0.dll
MD5: 0b5d110a0cd6132f62cbf0017111c920
SHA1: dc0d4896e9acf9e7d21fafd46ff3944f2a61a4bd
SHA256:76e7bec42d09880973bc4925708f710151ac1ff9b915ac4102ccf591f08c987d
File Path: C:\Windows\System32\downlevel\api-ms-win-core-heap-l1-1-0.dll
MD5: 28c8dccd9300103fabd0b946764ea971
SHA1: 210d4154e05270955c752a89791b2a37c60cb045
SHA256:61dfae09b998b4fb208c282a9c61523b810e8afdab6ef1abe6931aa2606bdb9c
File Path: C:\Windows\System32\downlevel\api-ms-win-core-interlocked-l1-1-0.dll
MD5: 42abe5337196c9223d85cb7592ae3bae
SHA1: 46732058bfda90adaf3c3b57bdd402d6f79ec1ce
SHA256:7854c9b8e70b0e261784492db82873c7f84e427d9411686bb41c1172fecbf152
File Path: C:\Windows\System32\downlevel\api-ms-win-core-io-l1-1-0.dll
MD5: ff475dacabee125c0ad38c2de7a23b57
SHA1: bc36e96daa659c40d7f73921e06e639c903e458b
SHA256:4a8ef041c861833e2ec80691007b259e9c795475d1f10a56d44be464b9fae8b7
File Path: C:\Windows\System32\downlevel\api-ms-win-core-io-l1-1-1.dll
MD5: aa540f2a52e79f50f86aea63712c2547
SHA1: 6097d4dd1af63bc588643f8dff2578ab8311238a
SHA256:f00403adafd91807216ebbe99463ed04a77fb1935cff803e3fca2746bcbe3556
File Path: C:\Windows\System32\downlevel\api-ms-win-core-kernel32-legacy-l1-1-0.dll
MD5: dfcbdeef05be940a9ce37a4d9f72b163
SHA1: 7dddd2d42b752ee0cf565e841bff274c3339697a
SHA256:6b3a1f9245896b1ff69abbbfb23436ed1d40752c4a627bc7bba2804754f15b6c
File Path: C:\Windows\System32\downlevel\api-ms-win-core-kernel32-legacy-l1-1-1.dll
MD5: a05aeaf59a8b353e690041489fc2b2d2
SHA1: 92ce0c1a16a1b03cea3c47e4bda8a832538e8217
SHA256:b563112cfddf1623cd157e77981c1d21cb65cb5efab510e8d909e5aae69ed01d
File Path: C:\Windows\System32\downlevel\api-ms-win-core-libraryloader-l1-1-0.dll
MD5: 32017d873c1a09df333c7ad0256c67fb
SHA1: 4c3f1ce157cfe8f8ca28ebde8abba40360f752bc
SHA256:c764a1dd417aba873b3bcbb4e256de3694e702701b30b6ea5b743b58f3732ee6
File Path: C:\Windows\System32\downlevel\api-ms-win-core-libraryloader-l1-1-1.dll
MD5: b2a60bf7e24bef4c38aede289e9cf597
SHA1: dd8d9326a46a41701acac8dd38f0f6e80fa3873d
SHA256:481e94aa13ff718cf58af355c304d2f7279c830d0f6eb6bbf96864db5b3983d5
File Path: C:\Windows\System32\downlevel\api-ms-win-core-localization-l1-2-0.dll
MD5: 464df4108fd3c92b67953adfd272d093
SHA1: 324080f43258ba7c9a70f88f9067fad4f77cd8d5
SHA256:bf05002e9a83b94196ae0f1b1f53e8ba1356801b02bb7181b27edb5437988ded
File Path: C:\Windows\System32\downlevel\api-ms-win-core-localization-l1-2-1.dll
MD5: 09a29807aaefd9e6689607be7b2418f7
SHA1: ad5255095c284df7b8ebf2b6d388def2615b263a
SHA256:0163bd139d65f08dfde6d1608a13a41c76c4325a4d3eb92e00586ddb483a85fe
File Path: C:\Windows\System32\downlevel\api-ms-win-core-memory-l1-1-0.dll
MD5: 3302351ee399b465651b2dad8719f116
SHA1: 8ab4bd4fd0e493ecbd30a5f5d9f22ba807a2b292
SHA256:12e1b1299659686c57674477cbb7fe9092593bab4119a9b0e79138d2a3e715c8
File Path: C:\Windows\System32\downlevel\api-ms-win-core-memory-l1-1-1.dll
MD5: ed856d9dadd27bb0e15d7a4c85bf9b6d
SHA1: 06124f0547857bad3ad113f8635aedeb5ca9a284
SHA256:d03691504f2131ee4980ea011c714c8f6b0ba8418da20d78aba1f18ebe9938c6
File Path: C:\Windows\System32\downlevel\api-ms-win-core-memory-l1-1-2.dll
MD5: 4065d233bdefdbbba3515145156ff6f0
SHA1: 7bb912f0376cf564db4745dac85665dbd940030c
SHA256:a7e6e109567b534659e556f5a1a85c595c936dbe5eccd55589dd4c4950d1471f
File Path: C:\Windows\System32\downlevel\api-ms-win-core-namedpipe-l1-1-0.dll
MD5: 37b60063f4f1d7605cdb7dec2947b5cf
SHA1: 1e39a84d3046c24d52e5c5e00dd9cf11444d0116
SHA256:5698bbc568d9f26e1302cabf1f96d0e36b79800559625946c883384a94d65c33
File Path: C:\Windows\System32\downlevel\api-ms-win-core-privateprofile-l1-1-0.dll
MD5: 7021d743f128e87a0a701a890af0bafd
SHA1: 8acbd57fae145d0cd3ba863a0a30b6de007afaa5
SHA256:ceb66b234a98f8dd038cb0e279f5a2660cd55828889814ebe02f8b4bd7eae583
File Path: C:\Windows\System32\downlevel\api-ms-win-core-privateprofile-l1-1-1.dll
MD5: 9ff17f735a1473b405f04b9c06134375
SHA1: 5847f0e56aefddf4a880a4a248ce3f6d3d56f6f4
SHA256:c127c0f4c92dc653fccc57b5958209ae1f36b5ea93e57539b61cf828e458a74b
File Path: C:\Windows\System32\downlevel\api-ms-win-core-processenvironment-l1-1-0.dll
MD5: f437d384d5105aa614a9bbb398d05839
SHA1: 3a29872662cac5e64883c1b0373b378a5c184825
SHA256:0ce1ab14940be51d82638217c480fb7fd8c58d84f83a1b8afd07b75f5089acf6
File Path: C:\Windows\System32\downlevel\api-ms-win-core-processenvironment-l1-2-0.dll
MD5: eefad80e35578be852ef9f6089e24099
SHA1: 0f69d5f384dd66f7dbcb4020849492c3b01d8de6
SHA256:54225bc8737e7ffce211e601e1d264779ba480e070b21d240020f252a0643660
File Path: C:\Windows\System32\downlevel\api-ms-win-core-processthreads-l1-1-0.dll
MD5: ffb7914c55dc87c2398feea836cd9653
SHA1: 44250a528bfc10e0f9eb4cd1b7cda5b112dc8700
SHA256:c82baae6e8f01af6839d96578ad46720ada816be21295ae9929a55d5d833288f
File Path: C:\Windows\System32\downlevel\api-ms-win-core-processthreads-l1-1-1.dll
MD5: 1dd85830bd6f8eb28aa32e23a02514c9
SHA1: 3aa0aa5bdd4b4f5efde15d59fe5ad8c54f8b1d26
SHA256:e2e2e55c67c0caf51b06b1fb308accfbc14155decb1cca98af5500fb7fba6296
File Path: C:\Windows\System32\downlevel\api-ms-win-core-processthreads-l1-1-2.dll
MD5: 47ed55e36bae75bcad1092762747070e
SHA1: 56f3eee5af24e76a1da09018512ed29b75929a95
SHA256:a5737454f39d1c90f343ca161ce243294fb4e06d9e5e8d7211ce69ef3f289c57
File Path: C:\Windows\System32\downlevel\api-ms-win-core-processtopology-obsolete-l1-1-0.dll
MD5: 707f73dac20a7cb98befb5176b2e8031
SHA1: 13b98b3b11dac61fb2444b20ed76d2277bf6ce1f
SHA256:06c3c6769742e5f658a046238fa09842900eaf7b5f60aa7afd6b432ee7b477c4
File Path: C:\Windows\System32\downlevel\api-ms-win-core-profile-l1-1-0.dll
MD5: fff17e531242588ead93dd5c0cf7c8e5
SHA1: abb6f4000ff2b9f3b4d6e7523eaee5132bbee43e
SHA256:6d0e0ba6447ed4999f902d8d11eec7a0cbc3da930b5c54b3b3caea873c469c5a
File Path: C:\Windows\System32\downlevel\api-ms-win-core-realtime-l1-1-0.dll
MD5: 61c9dfd3dfdd790791a701f432f581f2
SHA1: ca40bdb6aaa8af3b154102e3067f0d977ff8027b
SHA256:f4a771f5057a0adca00a472ca01b36e90615c00543e7121172fd52ab539434c9
File Path: C:\Windows\System32\downlevel\api-ms-win-core-registry-l1-1-0.dll
MD5: ee67eccff1ec5527bcbae3859a60576a
SHA1: 9c1037b78fc083c2208188b465ad74e87f5aeb36
SHA256:5d7d4c1d163715c23682ae91e13b00022bb080864ca4b549372405928f5931da
File Path: C:\Windows\System32\downlevel\api-ms-win-core-registry-l2-1-0.dll
MD5: 4d9b1b864a64702e49a37f1d020f051b
SHA1: be30fc6927c230a84a3735cef073b64414c12050
SHA256:3178bd9307b109a484a4f37d4af94158849ec15425b3482533ac6f17dc10f759
File Path: C:\Windows\System32\downlevel\api-ms-win-core-rtlsupport-l1-1-0.dll
MD5: 351ba257c7bcd632641fc513a99fa214
SHA1: 989640b54246c4bf3bdfbf27fa61a7ef3bb5baf3
SHA256:024a97c745096191a8df9d581efcbefcfbfd0e73c636773941b251642004577c
File Path: C:\Windows\System32\downlevel\api-ms-win-core-shlwapi-legacy-l1-1-0.dll
MD5: 851e3ae0c263ba5c7141fbce3210040a
SHA1: 92d13cbbc615d66ba93f8bb650ec5d3894c8aea4
SHA256:e6f3ef6e26bf022663ce5cb27daf33e9381287d3d019c58b5e6d805fb4e18248
File Path: C:\Windows\System32\downlevel\api-ms-win-core-shlwapi-obsolete-l1-1-0.dll
MD5: a9d75570e4c1d4a7c498e7b98bb6a7c9
SHA1: a8ce2f7a48434191c20019c8f2bd0e52aed954c9
SHA256:c4f172b9a35ae08527cbe3a732e8c781c750f6fdd99efcd2cd9913ebebaba472
File Path: C:\Windows\System32\downlevel\api-ms-win-core-shutdown-l1-1-0.dll
MD5: b8d35a179b531f7732f7c5aaa7dea32c
SHA1: 36381bd9ce50bcf304dbca18f54cef1e91bb23b4
SHA256:327fc5970b4a1bf2aa14751066d5efcf1aa6247d6fd9f68f075b8f07387743e7
File Path: C:\Windows\System32\downlevel\api-ms-win-core-string-l1-1-0.dll
MD5: 62db3879a0d33ca248548adf065a257c
SHA1: 5f14b6583bad928270eae6237f03f7e7f53156c9
SHA256:0b5e2922492e61ff23a95969a1cfdba191898302938b67a4283199dfbe2fa9be
File Path: C:\Windows\System32\downlevel\api-ms-win-core-stringansi-l1-1-0.dll
MD5: cbaae0487ac1ab1434facfc893d2fac7
SHA1: e41b7a5b07c2395b2a174bb8698ecd0d22a74fc7
SHA256:33784850e16ccdde136bb2450f41abf6d6199acd6275e42f1c99b0c6ce6177b0
File Path: C:\Windows\System32\downlevel\api-ms-win-core-stringloader-l1-1-1.dll
MD5: 2e87cd64b743bdbb286057127fa6b3f2
SHA1: 37715a677014584465095cee07e3fc5eea83f3f8
SHA256:2b600754557f102653c05308b5fc8bdca2aef8086667f2f7414fdb5bd0e9060b
File Path: C:\Windows\System32\downlevel\api-ms-win-core-synch-l1-1-0.dll
MD5: e6a854dafa9a44475fb08df425e6eaa9
SHA1: 9e34b9d83234828b45bb21a50acbf153f343d2b4
SHA256:42f0bc17a510dfc87477510f070556740c24745c66a6dfcc38ac857e22bacff6
File Path: C:\Windows\System32\downlevel\api-ms-win-core-synch-l1-2-0.dll
MD5: b472cb62fd29f5686ff6c04b6cbba074
SHA1: 56ec685c0a09f62075bb404f96b76d6abc6e114b
SHA256:02c4e2dc2c922f17e1e174af76253775ee0ab2f83c421fd769591ce010fb1afd
File Path: C:\Windows\System32\downlevel\api-ms-win-core-sysinfo-l1-1-0.dll
MD5: 7dfacfba5289060a1fa87e4f37efc0fe
SHA1: 9e13d9d80c489c1d6d877f51b69e1157e7e4fbb7
SHA256:28b17340d6861ec8da158498a13323a696f71fd97e9f72fa71d9d54d95ab466a
File Path: C:\Windows\System32\downlevel\api-ms-win-core-sysinfo-l1-2-0.dll
MD5: d8bf60cd8ec0cc0232ee443a034b49ba
SHA1: 19c5bb4125a331df822ff7a9856c69f4a8649b47
SHA256:3cf71c707d57a00120f914f2ed020bdc76f87666278b4235443adfc168c355e8
File Path: C:\Windows\System32\downlevel\api-ms-win-core-sysinfo-l1-2-1.dll
MD5: 500f177f56cc956c9517474639ca0d0f
SHA1: 13e0674456d50875927ed45fe64bf3e8134b5807
SHA256:118c132f8439fc75441b1a431c4fac5e986151316ea30892ee9945a8e005bd2c
File Path: C:\Windows\System32\downlevel\api-ms-win-core-threadpool-l1-2-0.dll
MD5: 05d5001913fa04e5769ea4cf87251aed
SHA1: 5fd9a6436b9c59e257fa3d1da9d9ed7882ec801e
SHA256:24575b322e93ffdcc133eac36bdf6bcff40714948e6865455804383b451f437b
File Path: C:\Windows\System32\downlevel\api-ms-win-core-threadpool-legacy-l1-1-0.dll
MD5: 6957dd02a79018bca7a02dd6d04a5233
SHA1: fc6e82233f69d83edfc52c7910ee022af5021178
SHA256:27d770739521a232c2b2da48d62780ef010b69c64a21f20aaac1a57fb3d6ccc0
File Path: C:\Windows\System32\downlevel\api-ms-win-core-threadpool-private-l1-1-0.dll
MD5: 26cedf47aecfb777efc169a0740416a2
SHA1: aa843b496a93a3dcc0bcfccd28c4e3da3f9e3ac7
SHA256:4d4825ded8e677d1c4bc9ba54431568a75808645bf440403b45d4c60bc73ded5
File Path: C:\Windows\System32\downlevel\api-ms-win-core-timezone-l1-1-0.dll
MD5: 83e18ee6246907ba1de2715692c113c7
SHA1: a18e09d763330acf895ed276cc34597ff12a0319
SHA256:f2f3a2519f439a68e85e54df2277b49758765c3fa80f10be8186e95fad0f481f
File Path: C:\Windows\System32\downlevel\api-ms-win-core-url-l1-1-0.dll
MD5: b75d35f521944d970a9c6d86cf4f5f0f
SHA1: 6da663e27d4e3a55898a129b6c182f27794cc40d
SHA256:20115ff0c6090a7d5fabb6ba69860289aaff151205ec94c3de5eaf1552176e4d
File Path: C:\Windows\System32\downlevel\api-ms-win-core-util-l1-1-0.dll
MD5: e3a5b4fb020cc0d8a2237fca3fe5c70c
SHA1: 99b640506e5ab063aecc2163999630efa91fa9a8
SHA256:997ea6ac7e3a7694bec331b3fa4dd03ac0d7e5f721c87b84b7d2d533140c31b6
File Path: C:\Windows\System32\downlevel\api-ms-win-core-version-l1-1-0.dll
MD5: 429d8b6498e23908ae7ceda1123499c9
SHA1: c01994d0efb10e6930e41e13a454f374b37f681a
SHA256:bee6d37627b4edc189d7ec8f9e1f6c0b7f9d75d7a94f889665fa472818542bfc
File Path: C:\Windows\System32\downlevel\api-ms-win-core-wow64-l1-1-0.dll
MD5: b599f037e4bb79b6528ed8b02083c21a
SHA1: b86a8c414b32a08141dd4099211f807ddad72d48
SHA256:fbe26019379e1ac84d8cd99c09e06e47cd58e48bf9a108fab1106e68df1877be
File Path: C:\Windows\System32\downlevel\api-ms-win-core-xstate-l1-1-0.dll
MD5: 10cbb19c6ca333f5fbc4e04c00b96c2a
SHA1: a65abc9d1b492ea2d19b248b1060c1add0496cfd
SHA256:e5eaf11d538703962e987e05297a4d315bf4103d892c6ecaff8cabcc257e7684
File Path: C:\Windows\System32\downlevel\api-ms-win-crt-conio-l1-1-0.dll
MD5: 057bd0abef440891440a32c9ff22ae4e
SHA1: 4b73e7be26b100bf2e81475a1f04433a6d912569
SHA256:b1d8cde490382992d4c73a75c532999bd25fcf4dc484e99c4df0da3bb8eab064
File Path: C:\Windows\System32\downlevel\api-ms-win-crt-convert-l1-1-0.dll
MD5: c8dbf0ca88facfe87899168a7f7db52c
SHA1: e2cf163ad067b5d3b19908a71ed393711f66cd09
SHA256:94b6e91b93c2202dabd659bff294bee87c22897a30a6b4930b49051c2fb502dc
File Path: C:\Windows\System32\downlevel\api-ms-win-crt-environment-l1-1-0.dll
MD5: 9653409a06cf90aeae4491ee6a66125c
SHA1: ce0565b4212fa2d9824ab52c151bc13836b981f6
SHA256:5833bf2d9a301ed80514e6133b0dff7c9ba152b4631fa6bc0153fdd696c0757f
File Path: C:\Windows\System32\downlevel\api-ms-win-crt-filesystem-l1-1-0.dll
MD5: 42a2a95f1bb940d01f55eb1674a81fe2
SHA1: f982f3bbb4dc3aaaba8df098d1b395846f7cba08
SHA256:51541ec6684b43157a85ea46a42ebed4555be06bed0d0d07ff3ea6377301318d
File Path: C:\Windows\System32\downlevel\api-ms-win-crt-heap-l1-1-0.dll
MD5: 98da186fd7d7873c164a51c5d7b77f1a
SHA1: 725a8b8fdfbe6a1e85674f4b2a7c0dd08411e00b
SHA256:80139e4caa379d87b1d1dafc23ace71d2b330368115f6314140d4ae59c2a78e8
File Path: C:\Windows\System32\downlevel\api-ms-win-crt-locale-l1-1-0.dll
MD5: ff48b107b2449a647c64baabd49408a1
SHA1: efb868ba125d9ff08474f02b9483d74c36a13cee
SHA256:7bb8644e565ad4bcfd890f9044bccb4d99953a740e9a500b1f820b2fdc3fc240
File Path: C:\Windows\System32\downlevel\api-ms-win-crt-math-l1-1-0.dll
MD5: e10e077bb06209aedd0d0d378c758f73
SHA1: 97a9053a311280678f8ef65dc4e25975c41bd4ee
SHA256:8a7bff1c918539a75c25568db25933d653c003e016fd7791a37186b42bbb7c20
File Path: C:\Windows\System32\downlevel\api-ms-win-crt-multibyte-l1-1-0.dll
MD5: 964ca669ac5b78969f5878bd3dae4c6e
SHA1: e6afcf9e393900fbb16e1f0fc217135ce2bcae31
SHA256:d1b720ee0c34f72467aca491922b75e1bf08a71236926d96f65588a164659547
File Path: C:\Windows\System32\downlevel\api-ms-win-crt-private-l1-1-0.dll
MD5: bb6f4337173099f38fd45bea90a5fb9a
SHA1: b661d0ba0aa6974599fd15a2ddbc4084a02282bd
SHA256:77992fb879a7e0977858bae7dd87b73f7d4219f926c9b4c595e1a957a53acab7
File Path: C:\Windows\System32\downlevel\api-ms-win-crt-process-l1-1-0.dll
MD5: dabc28a5632a21e7f09accb9d69d10d7
SHA1: 254da0966025e432b94a95b4700af76aed0dea73
SHA256:e53e39324294f677e238eec0c084440c3f23da171e6cb1e615a30504bf408a95
File Path: C:\Windows\System32\downlevel\api-ms-win-crt-runtime-l1-1-0.dll
MD5: f91e1ff896b5616919ac97c7095c513e
SHA1: 4ec6eed0bac5a8801db10238c7b3a5d35a87be67
SHA256:07382c0d91dad2bb6ba8bd06ea02f12c57abf7c4e5a70672e9f2954d09a4ffd4
File Path: C:\Windows\System32\downlevel\api-ms-win-crt-stdio-l1-1-0.dll
MD5: 429c26ed27a026442f89c95ff16ce8c2
SHA1: 69ed09faae00a980c296546c9b5e6a8d5f978439
SHA256:2a466648affd3d51b944f563bb65046a3da91006a0d90fb2c0b123487a1fc1b3
File Path: C:\Windows\System32\downlevel\api-ms-win-crt-string-l1-1-0.dll
MD5: 0f593e50be4715aa8e1f6eb39434edd5
SHA1: 1117709f577278717c34365ce879bcd7c956069b
SHA256:bf4ea10be1b64c442ac0ccf4bdf69f6703467176a27e9e14a488d26448a6e179
File Path: C:\Windows\System32\downlevel\api-ms-win-crt-time-l1-1-0.dll
MD5: 56b870ccdbd25a5dbc2cfc072ba13bd7
SHA1: cb9f6acdcb7dd5a8f9d02a1280793440f66bfef3
SHA256:ac4e636f8e32a5d0fc274b56385abfbc301b2eecd7fd76e28f3d367543e6e65f
File Path: C:\Windows\System32\downlevel\api-ms-win-crt-utility-l1-1-0.dll
MD5: f3f683484b97d2365b0b77b5ebbeefed
SHA1: 3420e5946c5415131b919a2951ad183212d2d89a
SHA256:023e5185cff7cd2b8add590d4bc0e3240d24895c59ca8b0495e79608fd0be88a
File Path: C:\Windows\System32\downlevel\api-ms-win-eventing-consumer-l1-1-0.dll
MD5: dcb529092a5e54fd4322aa9f5519e30d
SHA1: b529189eec9efd8bbe0b30c4bd3ac1e84837b844
SHA256:a66c98d705b9a2ba779b8622a78d17d0b1eccae8172c6d284c53009ee8724994
File Path: C:\Windows\System32\downlevel\api-ms-win-security-base-l1-1-0.dll
MD5: 64511836d8e36b045debddf155273610
SHA1: a93da9f09e026f3d99455cd306633a67f86b96c9
SHA256:5cdc2ce6bf15ff37f3de842ccfa4c33cc2cea2f1441ffaff8b22a5254bce47ce
File Path: C:\Windows\System32\downlevel\api-ms-win-security-cryptoapi-l1-1-0.dll
MD5: 88c63a4c4e953f437b8bf571cb3efb39
SHA1: 570916a94c86195f5d6fab20a50ea1c64d72004a
SHA256:700d72006833299337a53b7c4908d593f386948aa831ba50d524198034b0f167
File Path: C:\Windows\System32\downlevel\api-ms-win-security-sddl-l1-1-0.dll
MD5: dcb1ca4da50d9464c0a006bd98c4929a
SHA1: 32d2ba790599eb90b2b2fe9426c6a2870ec5d282
SHA256:68c8c391547151d25cc915a2cc5dc09952f46ce9c14b95f9b06ce7d7555bf77f
File Path: C:\Windows\System32\downlevel\api-ms-win-service-core-l1-1-0.dll
MD5: 98715d9ab3ef5e9808a95723e50f8217
SHA1: 48e74a47960acfed7a1846ae387b0924c6eab0d6
SHA256:a7fbc5272b413efec0bdb4b6f67d17c3d384ac47491c1b677e8932fcb356f0c6
File Path: C:\Windows\System32\downlevel\api-ms-win-service-core-l1-1-1.dll
MD5: bf6c691e44be8386abf3bc998938130c
SHA1: 46c331508ecfd2a0954e78123b5919a9479f681a
SHA256:50329a0809e2d8c160f028c3e25ce4d111d881781ce0dd19f96bb0f54d470474
File Path: C:\Windows\System32\downlevel\api-ms-win-service-management-l1-1-0.dll
MD5: 01983d2c7a8294061d4496c5c9e185b5
SHA1: e094a728f86720cdd3d1adf513c4029d6af36d9b
SHA256:3c60e44cfeaf427c8bf6be78e1d04d32e627ed414de593804317c75250f94441
File Path: C:\Windows\System32\downlevel\api-ms-win-service-management-l2-1-0.dll
MD5: 0c54a86d5dc95ca2eeed03cc2248febd
SHA1: a3295a855e4531054e03485e61a6be2dd795e0f2
SHA256:75c9242c10d7c03059c8ae2298d5f6013c741e947ea13ffd9986593800565f17
File Path: C:\Windows\System32\downlevel\api-ms-win-service-private-l1-1-0.dll
MD5: e4421553a3754021aa19ee6c775d9dc0
SHA1: ff9a94ff0b92481a531f812d4dd6cdad50408151
SHA256:dc81de56caeec3a225976818f68a1377c5f371bdff11b21c25fa7622102389d9
File Path: C:\Windows\System32\downlevel\api-ms-win-service-private-l1-1-1.dll
MD5: cce221aab158d48732fa45a09d03bfe7
SHA1: 987691a3f6d11dfedce2d2f040a30ea6898eddb1
SHA256:8a90067c5c7049b1efc5fdd03ca09f9b8094ce9c9205e8636f7fc5a2296a6b68
File Path: C:\Windows\System32\downlevel\api-ms-win-service-winsvc-l1-1-0.dll
MD5: c19df431d3c756fb71fc06b10d40a90a
SHA1: b56858a8d325dd94d6a5df3570fab0b5f2e09150
SHA256:5ea4c3189e1123021721cb22ccb2db084558a9a0b421554cf600f20c3915662c
File Path: C:\Windows\System32\downlevel\api-ms-win-shcore-stream-l1-1-0.dll
MD5: a7345c9a04290dd9793f75e58282ca31
SHA1: 37664445e2f00706833062b4ec1e09f79457fb81
SHA256:432d169685fd17f80292470f18123f5a4cbaf4353b6cc0a40dd7b0ac7d9fe015
File Path: C:\Windows\System32\apisampling.dll
MD5: 27929904bb533b7003e960daaac8836b
SHA1: c75b994c6198c36656f61b88748265207f8432b3
SHA256:941a82a3a91462bf372a22de9e7bda96c27faf12116becdf6b9a5aeace95acab
File Path: C:\Windows\System32\apisetschema.dll
MD5: dd3888e007e5ae4ff231e8b59ed736d1
SHA1: 8a867a6c5a4b806eafc28a9afb62209422d77fd1
SHA256:7db6a28d99cc747cccf172ee57c09cd558fd87cdf3d5f8dd47588aee616cf450
File Path: C:\Windows\System32\wbem\appbackgroundtask.dll
MD5: f29672bfb0fbe6ab0e243b8f747c2a2b
SHA1: d6aa9d19add28c56e51c9f68f3357d7f5bd73855
SHA256:5c8fabc6deb9e31de141babba94bace2446e89ce7b1888c6d0feca49ccadc67f
File Path: C:\Windows\System32\apphelp.dll
MD5: 31f65e8aaeea988bd7e4193aafeeb521
SHA1: 27fb63606fc83372eb816d6ee225ab82a8aa3250
SHA256:8013ea1bc92b207498cf5b678a1008e3debe5de260ea9ba5c0a1e4b52c78d178
File Path: C:\Windows\System32\appidapi.dll
MD5: 2f2381c86285ba755441baace22e6095
SHA1: bb28a64e14d6b6bead189b280db0e3a223c4cc76
SHA256:d40cf60fab93ba6442f9437b80ddb9a3f3120f49c3a805bc5249aa91553fd894
File Path: C:\Windows\System32\appidcertstorecheck.exe
MD5: d6905a307cb263c085960a15028b01af
SHA1: 92592ba00f3038507afe4d1a8e6792637ceb5c15
SHA256:79888300c3935edecc5386e935a9c9076e790031c8bdda2aba1edd12ec2fd391
File Path: C:\Windows\System32\appidpolicyconverter.exe
MD5: cbe3f6df9c61b7c683ea777fdc1e699a
SHA1: fe8d96181723c13af5662d5e805f8868e4743c14
SHA256:e8d12975052b3c02611485a117c18055b4ca065bf1aa106c294231f1c7fad1eb
File Path: C:\Windows\System32\appidsvc.dll
MD5: 341ea8d42bf96082e6ef5add787dfe97
SHA1: 7f882bdb8c24d7af8e042aca15c1ed6a08267974
SHA256:69e2d446d9849f7fa4fd59e3a79afba0993bf86c6ae9f708f135db49e2d77d1c
File Path: C:\Windows\System32\appidtel.exe
MD5: c5b415675d9af654d00b29bd25975713
SHA1: 2407197563c57bdd850632f72674dc1afbdda361
SHA256:fab3c1924de9fae6d829af07e12d20e546aa2453e44c4b40b107f319ab55462a
File Path: C:\Windows\System32\appinfo.dll
MD5: d025c8d122fe5388e98463fa7311f2e7
SHA1: bee3b41910bcb7a58f8428db3557fada0e6cb01d
SHA256:423d1bfb4f179a94bad2c49fc75a4a1bf0332a5acba9dbf11bafca0a83d45dcb
File Path: C:\Windows\System32\appinfoext.dll
MD5: a7e9402034c4ea37128877d80b254840
SHA1: ab95d9fd657a3136d6ff88d9f661c4a2f4a786a4
SHA256:7f1f9454f0a5d9e1a9fc1be85e82a6d6fba7fd4758378021aa69ddc48f4c4405
File Path: C:\Windows\System32\appmgmts.dll
MD5: 91869efedc4217261850e6c2b8f42460
SHA1: 3e854b5ef79030e122527c6590732f38083c5635
SHA256:c3f02bb338eeef8cd52a58789ed518fd4041c41d5c8620c822c3e0a9ff6c3e81
File Path: C:\Windows\System32\appmgr.dll
MD5: ff565f4d9e43fa804c75ba65a3895a5a
SHA1: 61090162e596541cccd4d09ce0544d3220319166
SHA256:3a092894805e0f6e6f2da16598ec2e9128d486048d5b31a11e7a0b768f4cfc28
File Path: C:\Windows\System32\appraiser.dll
MD5: 06a09f8ab5a28ddf0fa8ff69af9ebcc0
SHA1: 8e1f8dfc985f9e8fb62ef8aa60cb8dcde8a95197
SHA256:113db3d05199107b1a23035856bb6f593ceb96347b09bda442b90bfadfabe52c
File Path: C:\Windows\System32\apprepapi.dll
MD5: 7f88b667aede19ea1b9375014e7d1eff
SHA1: a381e7c46fd7c2ffb60d8e65d2d36363e57ddb5f
SHA256:f68e1a6a864c71ed4baa82693203fbbc050b8b0a52c0101d8cb7c966c70995ca
File Path: C:\Windows\System32\appsruprov.dll
MD5: 38b82277a40fc5da913e586428005e14
SHA1: c6446bdf39257d0a114e914b9a6695207236e02c
SHA256:a7e86810ad3c95a90921e55f56ee6e7d2098a449704cf00a923ef9b83bce67e7
File Path: C:\Windows\System32\appverif.exe
MD5: dfd26a8e9e81a1898a2ecebcda2a0df0
SHA1: 39ddfece9cff5d37c64b32bb938679dba24bbf70
SHA256:010ccf007430d4267c3417b8aed20859ef3169eb7f66cea2ed522069d1f37158
File Path: C:\Windows\System32\appverifUI.dll
MD5: b2faebdfd3749bcdb4f9307914b2a3ed
SHA1: 8185f966f8a1797cd581730bdf351081fafcff5f
SHA256:80c364e6f37cf729ac0450413463a8d7e1f58196602c7b14bdeee4980509b5b9
File Path: C:\Windows\System32\appvetwclientres.dll
MD5: 06806b62d4db9283d7e93ddd2254d8ca
SHA1: d1efea06218244a07a8baf98eea4c0b0a21b8f62
SHA256:277679de8f8bd4dbf1e5d479272b1557ef3286609c4be9f85045e3022c6f86e3
File Path: C:\Windows\System32\appvetwsharedperformance.dll
MD5: c9f07ab7c9749e21add3c7cd9b456c08
SHA1: fa39513e5530c0d6f663ac3b09ac2cb4422e1a58
SHA256:00be3202e5e77a3a9236bf821267aaab32ae04774cb5944ed6536c75dce64f8f
File Path: C:\Windows\System32\appvetwstreamingux.dll
MD5: a75707377f244a4c0bd009e9efc15bb6
SHA1: f4bf40f2a3a76e19a5f2a69a3c9a64a75ccfe08e
SHA256:bc43c98c55fd4db273111c46ce9252ee12d7dfd8bde5a6ee7482646df6e768ca
File Path: C:\Windows\System32\archiveint.dll
MD5: e7adf67db6e1b44b1073b2a9bd12ac48
SHA1: 6ef7e43d8592e7a9c037e19f8af0126bb7fa5974
SHA256:0feb640017a04d982c61be40fb5d7d73af282854608d6d77a27b98e09a257825
File Path: C:\Windows\System32\asferror.dll
MD5: 095f83f3a59c1fe3f0fe09b83fcb61bb
SHA1: 53150630afd41a9f79a6c8ad283d26da7901d502
SHA256:f19af37f7a6df8bf1d1d75ad7207f2398facf275230a158c0ed16431b7d95e09
File Path: C:\Windows\System32\aspnet_counters.dll
MD5: 42316b8278aed7d5e656148c85689619
SHA1: bde48b0eead1926319c8a80e58a69e0d36315fb3
SHA256:13f7d71743ef977faab43fd4b873e319d19a7b10a5f7f8221576f752a072de89
File Path: C:\Windows\System32\assignedaccessmanagersvc.dll
MD5: e118033aa2751983ab497674dbb985e1
SHA1: 920a33f662c96219431a88d6dedc6c89ba2e19c5
SHA256:d56dc833626b1c143d9e200ede9871a62a84f50e2b9b4ca2234a58d33b26bc03
File Path: C:\Windows\System32\assignedaccessproviderevents.dll
MD5: 30b24de0e5e731e8c03c2874ed2510cd
SHA1: 7717c4205540575c10f9913275fac3df15bfdf70
SHA256:3f85dd765d2bbd3dd9618252785516813c1d284d9f695d729505e142bc8c97c3
File Path: C:\Windows\System32\asycfilt.dll
MD5: 2f736540faa03a49c0fc208a84a67983
SHA1: 7b261315e4709d5dd71e30de00c55d1b2605a294
SHA256:669ed1a95c434d39b2bc7eefd6e9e21f9383f959ae325c37dcef7d51837994e1
File Path: C:\Windows\System32\at.exe
MD5: 15fe2283b40819234c9909e841ebca0a
SHA1: b376962ab87262a0c2fe5231688b49bdb080583a
SHA256:5b97c39d87ad627c53023bfebb0ea1b5227c3f4e86e3bf06b23f3e4b0d6726e2
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_01d078da8c0f4900\atiadlxx.dll
MD5: 259f420fa8c8b38f307bf19e0a69dc5c
SHA1: b13532477dc7f38bb2f38fd0276d4be58a6535e0
SHA256:4ead95b14178919e1834188a457a4c897b1265699fe6631c5dbcb41aee7f30a9
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\atiadlxx.dll
MD5: 5592ea0e46f5e8ad20787562544d1287
SHA1: c3508f34c4b222649853b376f06f1bd3767b74d6
SHA256:426fc9516bdb91c9c30509032825630fa16daa7437812d8d6dbec4bbc523e661
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_fdde6ecd49c3a98b\atiadlxx.dll
MD5: 06d9ac3086769a011f2f43d3ff3d767c
SHA1: 2a004383a485ab65828a797f7bb77fa2128b2b90
SHA256:3b2eb2f61859dd199fdfaa00bfd2b03fdd0a10456181518d20d64114dda4d805
File Path: C:\Windows\System32\atl.dll
MD5: 8bd24457d79ba3047d8ddb3028d2a3f1
SHA1: e04f113b31ba42ba41f204124e436a1ece6496a6
SHA256:8ab0cd396109e5dc6bf5bbb1193a6bf6cac29611737b5e3a85cce4b7295f45e4
File Path: C:\Windows\System32\atl100.dll
MD5: 5a55e3e6f53592f8170623defa2b7954
SHA1: 9dc27d575868fd01fa10ee90dcf15de9dc0a7b46
SHA256:b524543192e78a2c97d3ec9aa0cfcbbaa308439d3a33f9a1f4edfbd3181d7919
File Path: C:\Windows\System32\atl110.dll
MD5: fe00086a2fc935af640c7f302c12fe89
SHA1: 919d9e63a3ed879d04bb31dc9d43a1195e24878e
SHA256:873d57e5cd660d49b403780685e91b6e3bc9e65b6e59435e0c5a5dfa1de0422c
File Path: C:\Windows\System32\atlthunk.dll
MD5: a27f3188b281befd70da5dfe0007b2bc
SHA1: ae18c9697b0af5c029b8889a11b3fc85cdd2c607
SHA256:d98c38fec266d080a907b7c8d6ca37cdb2e9a75575638ade7c9cd5465b8d0f7b
File Path: C:\Windows\System32\atmlib.dll
MD5: c52700b51257a6acaca882d039b29d57
SHA1: 3d9a16171412e403de53b8ec3b7bcebb131a6773
SHA256:e3d0a5a6c37951705f82bc0a19b7893987b0c9328f25f1b025c07acb18f2b5f7
File Path: C:\Windows\System32\attrib.exe
MD5: 5037d8e6670ef1d89fb6ad435f12a9fd
SHA1: b8337fa20077a2c6db7d01ccc18e328a91255745
SHA256:1043111ff07814b0d3439561b4cee5d7ec1799a7a0a419949fee707666f6dded
File Path: C:\Windows\System32\audiodg.exe
MD5: 9a3ef25595c2f5bcd2aaa2cd921fe12b
SHA1: 0bfc61cab4eaa58dcfba02c575cd5fc9ff723c24
SHA256:1c7d44556e943325f93ecfab2b450b962c43fbf51e18c10e374b4e4dd16c3dd5
File Path: C:\Windows\System32\audioresourceregistrar.dll
MD5: a74328d1f38611a3d5e40fb572d03fe4
SHA1: 754948354d2043b8f7eedfb664c50601b8f8815b
SHA256:08c5024eb22a925b9a95ab983f50e67e33dce8a47e748b69315f14e371b25212
File Path: C:\Windows\System32\audiosrv.dll
MD5: 91d5fdd196f3e9095947c0bdac5ed4cb
SHA1: 87915e873e28aa52267e75858a27d76af725daff
SHA256:e350e220c5d8082b9fcf6b24b38afe7a0d282123303225bb071a5b3c55215d6e
File Path: C:\Windows\System32\oobe\audit.exe
MD5: 98b86cb53bd64c395bc1b5df700abb3f
SHA1: 53aa93e3174d98c7bbf13655199493396b569671
SHA256:0c30986b8bf3cea403422e8286058ae05d2b7df43d959abcd0b32013d1e4d8c8
File Path: C:\Windows\System32\auditcse.dll
MD5: cd67ba8d7b819125486d10f8f6ad87ce
SHA1: 3be0a1a99f83026214eb5878f924fb5ab97f4512
SHA256:f7ad5555f5dc35a8ce35eeb645a72460a190980a9e79d3013cab887740e1b7d0
File Path: C:\Windows\System32\auditpol.exe
MD5: fed686439fb08ff93e57fbfcbd0680d1
SHA1: 5fee9214a1d6410091ee01aba6e11b1067f029ea
SHA256:7ba722d381aa8af4ee7091b421efba1568c56309bf78803af939c888b5cb1427
File Path: C:\Windows\System32\auditpolcore.dll
MD5: c77b718b515ba2ae73190bd5ab0e31e7
SHA1: cea6272eca107ad040b5dd466e11e8fba4359816
SHA256:68cdd62715e783be533d9ac32439e4a0e1b98d41d816d000681f1f752c42c203
File Path: C:\Windows\System32\auditpolmsg.dll
MD5: 560b3dccb58dc8e04551fb4197ccceb3
SHA1: b1e669343a9f6c1421564af78b5db99f1c4ed940
SHA256:fb764c109e0b2cfeb320b2280f104adcaa7e7080d09004c97ec8d586ac72960e
File Path: C:\Windows\System32\migration\audmigplugin.dll
MD5: 22a72f1352550357e2e22b021715ac75
SHA1: fc09ac00084e433647d8d2a14d7b4e89d11e1380
SHA256:4c73a41b0d0e9b75462d2f8f7a1cce2afcbeacc582deaab2ce86b0428462855f
File Path: C:\Windows\System32\migwiz\replacementmanifests\microsoft-windows-audio-mmecore-other\audmigplugin.dll
MD5: 6f53bccb21808f71cd139416f92fc670
SHA1: 3c9174be3e407764fa9d89a1e3aef1085b546971
SHA256:f75e0e70397a79c506923883cbab25e0d99542aa5547af8ea523bbe5df3e95b2
File Path: C:\Windows\System32\authentication.dll
MD5: 04aeb8e0e872b342c74701351a4e402d
SHA1: 49412c788285237b99f173e6672b5f5d85fa4a1b
SHA256:860228d6fa169b09840dd5508cc583a7167712a45de9f88cd9561f5fbe5dcfa9
File Path: C:\Windows\System32\authfwcfg.dll
MD5: 3e70d842ee593b0c7d3522ecd3a54567
SHA1: 8377454078e071ceadfda786b1059a843f45b924
SHA256:11455e8a190e4d490af10d681e4d038d187791b90f448e352a6c32fa3799c845
File Path: C:\Windows\System32\authui.dll
MD5: 9ddbf25ea4b88eded3fff8c4f23e1181
SHA1: f01cb6db0705f99332b6970dae0cc69f679c4fe4
SHA256:ad6c934e39d61f8e2324d2f8d2d7b771bcacc9029e79d99f0c14226b0663217c
File Path: C:\Windows\System32\authz.dll
MD5: d82003a240a6f2144a91d9cb59bf1587
SHA1: 471446b3edf8018d24ccf55a546c93e7bdee364e
SHA256:68bbcb54520c9ed2f8a5b3fc30c5c6a35cabca72faf0350faf58d0c1b56aba79
File Path: C:\Windows\System32\autochk.exe
MD5: ea210fc84e0dcab976699b0e2d20657f
SHA1: 1a7420c80605af7e8f557230fca461d61fa9e74c
SHA256:0d4f24ef67633905fef79c82aabfa2d110c4ad5663fa2014069b4caf90c13d0a
File Path: C:\Windows\System32\autoconv.exe
MD5: 34cc4270ede8a7d60d1cbfb49fe5e713
SHA1: 98ebdbba0edcf2aeab9853fb605feecebb148ec5
SHA256:ae0708436e5e89afd7aba37121190e6e816c09fca676254271dce4fa2e7cefe6
File Path: C:\Windows\System32\autofmt.exe
MD5: 826a37561012c3e78999391c628f6d64
SHA1: a4cfa054f354d9684a00492b3df573830be48d8f
SHA256:f25087ce1a3078a428fd019a7800d5344f49187493c038cc994153a148f6ce7a
File Path: C:\Windows\System32\autopilot.dll
MD5: 280c2e8a3d107a4e4b5b8e2c69555ce4
SHA1: e7245aac165cd01a75992eb2643d51010548085d
SHA256:f03d2cfb49a29e7f4aa7ec2e331e4cb660741c8b15cbb8feb6eb8335fcff064b
File Path: C:\Windows\System32\autopilotdiag.dll
MD5: ecd0dd7351eec83fc8a177565b88026a
SHA1: 0067ff99f6917792ffa3cb441420142fbff46754
SHA256:0726fd4de641c1179105771e15e74ee480eaa91c269a09261b9c709dc1cc220c
File Path: C:\Windows\System32\autoplay.dll
MD5: fc045f49bf061b2d2592a9be29f46eea
SHA1: ada4ded892ad6c18dd93c1d2bae280090377433e
SHA256:212a8dbeb2cc1c066fb13548849b22a257e928c97f14ba22d9b3b62b0a84f2e8
File Path: C:\Windows\System32\autotimesvc.dll
MD5: ddc9abdd87db68d60129535c21ff8fc4
SHA1: b8b7a2c3126f15897b81ec3e3154c36df077ff9a
SHA256:e739c6601e1be05f52918dcf72cfb2ec6b59a63b14f54076a5b9ead4e81124ac
File Path: C:\Windows\System32\avicap32.dll
MD5: a4756ecf8166547faf38ce14f84190a7
SHA1: f0713cc76fed32cd83e0157291863b0b89eda8a6
SHA256:4ee9ebf7459defd5901e6635bdf8dd9fbcc58d59afff0b14be43098130c16d8c
File Path: C:\Windows\System32\avifil32.dll
MD5: c5610b8b01c0766331127e4dd747eb06
SHA1: 4cf0831df0204d59847f43c5ed87a1f792d9fe63
SHA256:9ce16f1915b22fbd6ecf8332a4531049ab67a3d97b1f4037415d2e90958e6925
File Path: C:\Windows\System32\avrt.dll
MD5: 1f987f5e0d718f57467f03a4fef1a99f
SHA1: cc0968d4f08892d821a56827977d3d67d95016ab
SHA256:ba494df49affaa9f2e374f961e0182f6edf93261214a7650c9a7b75b039c7a9e
File Path: C:\Windows\System32\azroles.dll
MD5: 56c49755fe794c2b2f07c6d2e2e0966d
SHA1: 2fc8f17a42e0920fc674d600da9c1f275fde59b1
SHA256:75594b859b9ffb98b2982939483893428400a39dda203ebf91cc7d799ff3e0f6
File Path: C:\Windows\System32\azroleui.dll
MD5: 7bc18bc047bcddbffc1a38077d3bc375
SHA1: 0c648ef2d28793837f81afc74931e6e3c4a61b39
SHA256:a87062351fccab044a634fc7e28ab9824cad6f46492264e03bbf4ad5e9519d66
File Path: C:\Windows\System32\baaupdate.exe
MD5: a5bcc0e852ac6b17f3d0e6c9f95e95d4
SHA1: 8591856dbaf1d2ee1604ce7698471531b6daf91a
SHA256:9f2251424d855579c2e2ca78486ff4dd1df807e6f02fd5e513065225e44ad4c6
File Path: C:\Windows\System32\backgroundTaskHost.exe
MD5: d4f3d9a5ec7b4ee9e7c9694e7c72dd45
SHA1: 73569b302c7811efdaa387b24d7bf4ad28e6d687
SHA256:7077cbf56490c86fc74c0cc6c0379ab679f06a066e71906ad23458f664836449
File Path: C:\Windows\System32\basecsp.dll
MD5: 2282ddfc6896d73a665b6a1909645af8
SHA1: 3514cd838a0c6dcc2ef62c30fb7952b2f46cdd61
SHA256:bcb0847193e7b501a9b0931045431690fd01b1dfbde4ecd95ad842820a68c6fd
File Path: C:\Windows\System32\basesrv.dll
MD5: 439e4922e6553aecc5ddad226ea71444
SHA1: 489670a2ecb8b119b82b3054128f3ce71e0571c3
SHA256:d32eca1083847bfec6a8aee93f4fe3a0e61fa2aabb9a45a7f2b3f1ec1405888e
File Path: C:\Windows\System32\bash.exe
MD5: a4b10f9f587e138a5ab6574d58a2f760
SHA1: 462f6adc80b6e81bb81be42a881da582cc758c48
SHA256:705b2203fec30bf7032c3fdf3fec6aab3be1948005efe081945ec3594cea1be2
File Path: C:\Windows\System32\batmeter.dll
MD5: 72b4c51711c54edfe24129ae522221a4
SHA1: 43d9b8f0d15cc235b3170dcdb25bf15be300563e
SHA256:61903d145506ce4857e5211e289dd9e0251b1081a2417d268d373284c76293f0
File Path: C:\Windows\System32\bcastdvr.proxy.dll
MD5: 38ab458f4eac66f5b5ba7971b7cfb0a7
SHA1: 2ec05391e29bec9a5a22bdb60554e78fd36ab7c0
SHA256:45c4e62e643050da0d35d2da8af1f6e743c2c5b3376c2c4e041c9ca2b18d3ae1
File Path: C:\Windows\System32\bcastdvruserservice.dll
MD5: 6b041097415ab06ffb964c4bc2a0fb52
SHA1: 2980d90d6cb4f759b60703b66d36295cfa3b45d1
SHA256:d2d0da50dd0573271cd8f0158da975d69723340d7fb306bd0037b46594b75532
File Path: C:\Windows\System32\bcd.dll
MD5: add954e04e828252a670d5b56bc4299b
SHA1: 777a51b84176deb8bf15953f2164aabbe65df9f6
SHA256:e0f097594659ac3bd786b4e7774856d0753242f07e76905b33a4ca6e133322d4
File Path: C:\Windows\System32\bcdboot.exe
MD5: ddae32c0730b0a8942872e9467e795fd
SHA1: 5c153c10e9eb8d6e5c193e4be1b6067141da06db
SHA256:7383b358e67786235c7647dc435c60ebae3a56d525bec5c1eecb139769d5649e
File Path: C:\Windows\System32\bcdedit.exe
MD5: f987a31277a1f1de99f11d04cde83a03
SHA1: 1eb154d5462c2b4c5c90f533d7a97884fd264d6c
SHA256:4c9cf4c3577c879aff86a8aeda42a0edf441c6e00f9ec429e8e8f0bd0f73b27e
File Path: C:\Windows\System32\bcdprov.dll
MD5: add708e16110cbca5c49c32f44f16f91
SHA1: 786d9c525f585db07c70759327e4a05f7c38da50
SHA256:d725cf226eae257d333473e33f8d4ee1af12396f06d69d00d2589e3ba4e3692d
File Path: C:\Windows\System32\bcdsrv.dll
MD5: da21af03a9cc437457f372b49da786ce
SHA1: 3eb8461ffc219f6cf85f9fe93bae94c9992bf29c
SHA256:0e7e97ae60698a6d52ea8d564d3eddce16bc806a1b291b34c3fc5612e5eeabc7
File Path: C:\Windows\System32\bcrypt.dll
MD5: 39ef6359a529d2d44e849905d4ace360
SHA1: d6c376747e55e92b771d43b8309a1b4637845c59
SHA256:5d05db7db46d509ff71b7a952fd36d3a9e432f1e8e26fa0a5772f3d260146e81
File Path: C:\Windows\System32\bcryptprimitives.dll
MD5: fa7e5ed7db370614dc453f6573b0bc97
SHA1: 862b1ccc4ba5cbfdbabb69d873717d799d6340d2
SHA256:605da9c5812900dc12780bf54d85de0cd6c300055c2548cb6d6036e4eb42c1f7
File Path: C:\Windows\System32\bdechangepin.exe
MD5: 02239dd6f6eeccb1a761a33c0cb8cc3a
SHA1: cddcdc30e1e81396e42103db1badac5eab5ea3e9
SHA256:bf2b89698d4926d12295a62a6631115e219d4d9eb4f3edd95d26086281ac642c
File Path: C:\Windows\System32\bderepair.dll
MD5: adf5efc6a6df55a66a82e5145c495b99
SHA1: f9ea346ee040e1801f6a678ad4e3e9b6af713b02
SHA256:bca197e9067f113ecbf0bf809154e6e07ff5e5651615e73ccdcff6707ba3b1a5
File Path: C:\Windows\System32\bdesvc.dll
MD5: 155b51c6fe1b019a32200d1e59c67538
SHA1: 54fea5cb3e22c41a05e0142624bcb3fbf3f75f82
SHA256:d6bbf261b34e844884053d39f7cf095328e205e652fe6910d6b123bfbddf681b
File Path: C:\Windows\System32\bdeui.dll
MD5: 1eebcdb70d5ad1deb5a110c6dbe7c03c
SHA1: ac7eb6d6d19d69622bad939e4041180ccc1c4034
SHA256:22ed2343428785667e5eeefdce827acdc2f729cf241c0c21c5d5d82f0cb36880
File Path: C:\Windows\System32\bdeunlock.exe
MD5: a7260013fc76f6f5908346df1bc7966b
SHA1: 11892c3e73adcfffb5bdb5b433344958746626db
SHA256:58d896f7e78fa65345583479321f00ca14b0ae4b1aa3179de86c3f0bcfddbfee
File Path: C:\Windows\System32\bi.dll
MD5: 27f7f3675f965e0f199c64d7643dc85d
SHA1: b1e9a798c03b50cd6a3cea77bfc70607b542cdd4
SHA256:1f41f656c55923b63df2f15e39f416f0823c17cadc741b82eaefee852a2e8e4c
File Path: C:\Windows\System32\bidispl.dll
MD5: 2c235b6c01cc80df77662ce99904fa40
SHA1: cbe227590f3576e3d0e9bed73fc128ba7baa3a1e
SHA256:76eb9655a0b56fb3b6217795eb4f989ed2b26f8bb95edabf57e26e3624bee996
File Path: C:\Windows\System32\bindfltapi.dll
MD5: ea0b5af5f43bfe1c1637e92c633389be
SHA1: 33b71a7028b99e065d46f2b1ab2789e0f4f5b269
SHA256:5a0c7591ca7d4118e827ea9b8712f5e3ef3756510d894942d903dfbd06b89800
File Path: C:\Windows\System32\bisrv.dll
MD5: b17a32430f17b4dd051339f9e371a8bf
SHA1: a9682f406f460c7e2abe3ca796b236aa983f680d
SHA256:6e59acf6ceda1fc9d0a82659fe726e2fd5adec34f09c066a0f575f6d13fd3c99
File Path: C:\Windows\System32\bitsadmin.exe
MD5: 01aab62d5799f75b0d69eb29c1ca6855
SHA1: 3fd6eb9a72446f34f309adfaa6b8695eecd5b4b6
SHA256:739b2dd012ea183895cc01116906f339c9aa1c0baabf6f22c8e59e25a0c12917
File Path: C:\Windows\System32\bitsigd.dll
MD5: bed89488d42711c178091e59550729ce
SHA1: b671dfb4aa05409b08a85204ffbf51fc52436bfe
SHA256:39eef98b7270eb41979881ecea1661ee810b03abc6cef920eda3b528fefef2d5
File Path: C:\Windows\System32\bitsperf.dll
MD5: 46c76a50aba5fb6c398bc85297e065ad
SHA1: b0d01eccbb00dd0cfd28aa7dfa4052f5289cfad2
SHA256:2553cf125f93610ed057307486b8b07a9b3924e61981eb536b41441688ef14b0
File Path: C:\Windows\System32\biwinrt.dll
MD5: 65eaeebf6e79c0ed114abe594c4ed3af
SHA1: e0d569ee46439221a516033fb731d8f160e20f23
SHA256:e0309a7658a7bb90395133732adb96681235b1b3da0fb1f5bb3903b0ab2a7ea8
File Path: C:\Windows\System32\blb_ps.dll
MD5: b60fe8188b8f7fb14009787ccbdba472
SHA1: c8e74f63b5bc5289918c7c66e523431d8ed23172
SHA256:68ed227d4ceb4e7d3945672f64620cb11b6e99f166ad1a1df6fd32ff270ebce0
File Path: C:\Windows\System32\blbres.dll
MD5: df5a7a6d0383a49eb1a8f92a82b4320e
SHA1: 11e09b10ac4ad4ed09c157114feb33e250481032
SHA256:5820801622420d26c8248335a78d76165204ecc3b644319f6a27d5d0ee8ef1bd
File Path: C:\Windows\System32\bnmanager.dll
MD5: 3c6453221449cb726ca71b0cb5783f87
SHA1: 2b13b70659f96a0b466c9c40e316bf5de377557f
SHA256:686b85231f003617ad196071cf605dd9c98870a7c699beb5ef39a0d69443ae59
File Path: C:\Windows\System32\bootcfg.exe
MD5: ec92eda497062006dcfc1d200dfd8c97
SHA1: 1ddfd9e8224e4ccf18c6f6dae69dd7d8655d6716
SHA256:3ae4009d8722649281c1f352cfd65186198fc6ee8fd62b436869789f8d06d348
File Path: C:\Windows\System32\bootim.exe
MD5: 6fc597409aedfcd9db762ed19318971d
SHA1: 375eaa2e44397524c9c1a37b9286ec0f54fd58f6
SHA256:4f4be3b0af35c04ad42a3b43333726093191c406e8a8ba0908ee5098085be392
File Path: C:\Windows\System32\bootsect.exe
MD5: 4a59bda770a1683a7bc5a913ea1d74ab
SHA1: c65466640bd627f40c67c7ba07814bcae4b69e2f
SHA256:2d7ce2dd4a9ce5fbed2c150720280cf50808b0cd5d7d988cdaaf5bd1e9e292f3
File Path: C:\Windows\System32\bootstr.dll
MD5: a4cd27eba0140ed79ff54814a87ad7ac
SHA1: e4fe9fea6746fd220b828735a98a563f3737a4c1
SHA256:62602617028af7b6e1261678bf51f2fa07879e668f4bbb7da7e36df16662e2bc
File Path: C:\Windows\System32\bootux.dll
MD5: 42ea40ec8302f26d7303fa5bda6c76c2
SHA1: 1a54560f7adc489184f99940b40853786e3185d1
SHA256:474c7e486f642aefe3e636e0ee138f3d8fc04b7beb8f0876e0f73722e976123a
File Path: C:\Windows\System32\migration\bridgemigplugin.dll
MD5: f46ff52e7c87837dfc0218a0c12ed847
SHA1: 8ec681ce5d67119e88c8d2f80c6898d99aa69969
SHA256:4ed3194b1ec6e2c6f6fd2600801ed5a6780c16acb2351f716745a9665cd74288
File Path: C:\Windows\System32\bridgeres.dll
MD5: 986a47df3c85d3b92874b5b1ec02c72b
SHA1: c8399df5f584a0bd1b805d4cbfaaa6851ee3d4cc
SHA256:a432aae81e3c7b6ad1ce9d33a98194015b1897868f00e84827409e7f427b5a5a
File Path: C:\Windows\System32\bridgeunattend.exe
MD5: aa9147faaee0724c637931246f0e52f9
SHA1: bae8a9b25262d11202c0d1f955149027246cfa73
SHA256:0dab54a90bf52eb64f8eb50d94298f2c55d04682369c93107315ad91a3c6d642
File Path: C:\Windows\System32\browcli.dll
MD5: 1115d0181f3ab6565396a7af49705806
SHA1: fcb021d049bd06e2f73ab07ad6860814cf860c2a
SHA256:f398b28050f2616abbcba5c043c5fcdb879593ee3b9c17459952a5a07e105dae
File Path: C:\Windows\System32\browser_broker.exe
MD5: 2fd5b5ed20463bb105e5d0d3c786695b
SHA1: e80a0c83ebfa11420ac7f67d6cbfed241bf691f9
SHA256:d5fffd8ea5cd580404c4a2853fe68ec0427460781e66fffe259404479acd8173
File Path: C:\Windows\System32\browserbroker.dll
MD5: 81d7e11eee265f4c719d4627595d5863
SHA1: 090659f595c837bc53f8646a0d33da3e358ecd7f
SHA256:96d806f6e9b83cf2bc31b12744a5344a95284ead4ed82f0b3f9f2717516a6ea1
File Path: C:\Windows\System32\browserexport.exe
MD5: a3fe2bb4b2ca5611515418fa089df96d
SHA1: f2dfe4c366621552f2237ff97bb8569fc630f886
SHA256:722e6483f2789e5d2f5518e1f11e87530b83dac220257de5b5bb7c57c29ec616
File Path: C:\Windows\System32\browseui.dll
MD5: e5a90630ba4c6f07a310adc121dc6534
SHA1: ac56b97609baabf91b04de24a9b6e606670c0b00
SHA256:aebcf549c51dbd8acd62e6b696f42f8b454c7518f506bff5383f7ea1b8f333ee
File Path: C:\Windows\System32\bthci.dll
MD5: a0609944bc3e221e9f8d39f41c6eed9c
SHA1: 45f6491f5248c0cb66e359c9cfc4040869915906
SHA256:31383b8bfe38027b972b8896f3dc88d0a3b8c43fa3b899f1e0f2696c6ff49996
File Path: C:\Windows\System32\migration\bthmigplugin.dll
MD5: 176835f6acb0dc12f1eab9d9fdc3d706
SHA1: 360305cc5fe295afeb269d0914b154e9946a233e
SHA256:39036a3edf5bf4264f06a20952baa9511c15e68db8d6ef2148e0dcb5c4ab51a3
File Path: C:\Windows\System32\bthpanapi.dll
MD5: 320eb6f937f1cf89c2fa706800d1a984
SHA1: aa55b77cf3cd467a4206e94bdfca7846f0ef4a6c
SHA256:91ccb9dc8e0202c4dbe3dc714102737730162269e2eedbfd5fae5e9651e719aa
File Path: C:\Windows\System32\bthserv.dll
MD5: e39119d9e2892b3a224e9d5271bffd53
SHA1: 2c55c06ed0b3c5575b17963dec8162ac92b160f1
SHA256:fdb7c132e18ea702f4f04e071a5bd7c87c2b9be52dd680700e14b47a6eaec00c
File Path: C:\Windows\System32\bthudtask.exe
MD5: 4dcd6fcabf20fbc8bfb11a9f6e4b77f0
SHA1: 233eac2bed59b8fe167c1501ac3fda48b32a1b0c
SHA256:cf5ae95c9fdafe5f0cc9d7010412e84502fe66ad60f57dfdf68735b9315ff444
File Path: C:\Windows\System32\btpanui.dll
MD5: 2bcb63a08aa65a4f9f66e9d77f09a21f
SHA1: 0447378b4f3673f01256da0ee93e4c373f42a863
SHA256:cf49d605f5063bd1871884569756ae5ef9b6d6ca9388fbbce3db8bd18c38fc14
File Path: C:\Windows\System32\c4d66f00-b6f0-4439-ac9b-c5ea13fe54d7_HyperV-ComputeCore.dll
MD5: 6a37d550413d48239e06d615f3b55b7e
SHA1: cea7892e97dff23ff1f682121281b75e32b12677
SHA256:c0b7afd8a6737ff59e68abceca59c603dc4862ba864bf6ad519778c9c8d126a6
File Path: C:\Windows\System32\c_GSM7.DLL
MD5: 5c12e82ce2493fb9dbc52b55084f3d04
SHA1: 4f2f10b8444f554f92b4af1cf513e03566693e35
SHA256:f79178cc201e684e4f9b6a7b68804a624afe448a0ef327256d5f35bdb623d5b7
File Path: C:\Windows\System32\cabapi.dll
MD5: c5d0b36930dc439ef66c1c9a0254a1d9
SHA1: 04dffcc78eae3a4323aded658a17011772458848
SHA256:e77640c4e4bf7f78ad44226ac6b17842074653a1ad2baa747829d3b19b5d9ad1
File Path: C:\Windows\System32\cabinet.dll
MD5: a83504d6c9b698834c0ee0923bbfcdb3
SHA1: d0d1df7266b3d1df84df8b9f81e709c88e9cd21d
SHA256:bc99c4959e74204bd03f02e097e52051650fd17d1cd6db0055f75b5e3088c138
File Path: C:\Windows\System32\cabview.dll
MD5: 07bb00d7f4b5126a357ec50cd38036a3
SHA1: c8a1785e6ec89ed00a616d817e7cde292e119f95
SHA256:7b2104dab62c65d82fdc04ea20eaf76104894f36a2103757286da0d19707f46c
File Path: C:\Windows\System32\cacls.exe
MD5: a353590e06c976809f14906746109758
SHA1: 3e38480e52434f1e193d9c84b8bdc133c4bd10c2
SHA256:d6e40b4ed7c0bc8ac18b15d265ed2edab9efc260332ef0a98623f943be3a43fa
File Path: C:\Windows\System32\calc.exe
MD5: 5da8c98136d98dfec4716edd79c7145f
SHA1: ed13af4a0a754b8daee4929134d2ff15ebe053cd
SHA256:58189cbd4e6dc0c7d8e66b6a6f75652fc9f4afc7ce0eba7d67d8c3feb0d5381f
File Path: C:\Windows\System32\capauthz.dll
MD5: 8fd9ef600287f536521015ee58ea9c20
SHA1: c61259d389b4a6e80d6441c2a5ac0468fd276e79
SHA256:334392cea38a4099da4138c5ee608c4dcc0d59888197cd9dbe010beb2cfc7b77
File Path: C:\Windows\System32\capiprovider.dll
MD5: 2c883da1e3043fe794008f69a946cf1d
SHA1: cfeda2312dc13002936895b32246e60c57da8c30
SHA256:84a6c9f1d998f9179517f43fd7352c30207cba4f530d3ac3e98fe54f6ad2a28e
File Path: C:\Windows\System32\capisp.dll
MD5: a4c6071c049e139bae67f4ee933df160
SHA1: 6805c6bad4f8bb13968c1cf726e969bac36705ef
SHA256:9eecebc9015e62574a1e0453b82e2b08587f6837b9706d79aa3cc847036e6314
File Path: C:\Windows\System32\catsrv.dll
MD5: 6a2a9cf03531afcc4bb1f34fa12a0b84
SHA1: d995b5c2b0ac5b12696ae057beef3425cb071122
SHA256:1cb65686d288404f09681ffc050b4dce6970e77cc84a405bd88e42734bdfaaf2
File Path: C:\Windows\System32\catsrvps.dll
MD5: 197f6b1b2b0cd02497eef29a4360f822
SHA1: ebb69f4f51447be3fd904c1d8ded9e5687d42dd4
SHA256:3a5b9221710b9018e7d7ae62c2d42ba734caf31f7ed41244df06e782069c816b
File Path: C:\Windows\System32\catsrvut.dll
MD5: ebbe0e6cf73f200d578e7f8d487d47b1
SHA1: efabb302102c4863f778ec766166061555c36abb
SHA256:8e04ba49fc4c8b0f5bcb1d8cd7a203b0ea0a794e7bafd3eb9d02612d464bb16b
File Path: C:\Windows\System32\cca.dll
MD5: c43861024d8f5cfc8bbb0f5e7d5807b0
SHA1: 6d268ed8ca048101ef1064e478f80c52794d2c91
SHA256:3c4532438fd1cb1c21f30589cd0cb816ace24649131100ae08f43e7827f01c12
File Path: C:\Windows\System32\cdd.dll
MD5: 051667c394380c5c23dd5febf54eab19
SHA1: e0bdf29d7c2b448e5560de1d1f832104255c0338
SHA256:17d9e5f3526300aaffd8439990ae819544e31cac606ebab9cbdf6978c2d8b3a8
File Path: C:\Windows\System32\cdosys.dll
MD5: 2851f82c554234aa69b235a649069393
SHA1: 8a49a8bd4c303ff2da24894770e52a38a3fe6294
SHA256:12580479a691a8285ccd4bf47c26c7ff94847c90660b135bbb07862a71c34ef1
File Path: C:\Windows\System32\cdp.dll
MD5: 665d8bcd460d839d2ea9abbaa840a3bf
SHA1: 4731cc0fb31532ffb8354eb0ac2b51a09b61c38a
SHA256:a3570ecd17c435f4bd7242aaa4eb76b3f9bd6272f8cec4dab47b3ee4d245e4ae
File Path: C:\Windows\System32\cdprt.dll
MD5: fe5719ef2aca51956b090bb37074738e
SHA1: f078f4402c4dbd53ddbe31dc6a437e619fec76a2
SHA256:ce57f68d7237879373caf005bd7095ea95557208cbf9b9c1f01cb54b2fcf9126
File Path: C:\Windows\System32\cdpsvc.dll
MD5: a4b641175c93ca6fb07e514bc5ed225e
SHA1: f45e6d2dc1c95eadd44e3a3687eed961c1d028bb
SHA256:6075211ec128c506bbecc753b8267da387e20a80d0cedcfaedb1534a1803426f
File Path: C:\Windows\System32\cdpusersvc.dll
MD5: d6fd560091928136e02aabe3ba0e0782
SHA1: 0e593b7834092228ffb19963b1fbfcf27759e7f2
SHA256:02bfa64ab7d834c1eec6d40894b16c6c9a05760dff76e80d746727be25020a49
File Path: C:\Windows\System32\cellulardatacapabilityhandler.dll
MD5: fa5c060801b1bb5f4f9e3dd2b3225f08
SHA1: a95afb3172cf0246574058fd164783a6171b29bd
SHA256:9ec49b03b9b61f8bb0180cabf702462803a287701653ecd0a4b4e9677e93eb25
File Path: C:\Windows\System32\cemapi.dll
MD5: 1be9fc6ecf492de7aadac2d6e04f1262
SHA1: 867885ad4fb4fc2f9a48c578a88d04176dcbb44f
SHA256:cefbcddc4912fcdcdb1313aecb70416fdaa6d5e04c522f8dc98e66ef7a01c3ee
File Path: C:\Windows\System32\certCredProvider.dll
MD5: 9a129200d537445bb2659c70b0220ce1
SHA1: 9728f49d174e2a5325dd02d143d9c1567f2452b2
SHA256:78256e90fbbc3918a975c83a70c6fbb38980095b5d0f7d8d6b3101f70f7c1e39
File Path: C:\Windows\System32\certca.dll
MD5: 636f165bb6037d3f0b3dd56576f4503a
SHA1: b1975c4fcc90b3121ac75daf031d90b30417c33a
SHA256:b441b0391e7b15344481c2b552815dd7e48aacbb723d94f9d9935709c53fab16
File Path: C:\Windows\System32\certcli.dll
MD5: 8eda09cf973bcf2938b1074e87cedd7f
SHA1: 5e5296326388bcbfdfbb7ca7620b28dafce5fb69
SHA256:23410c7694a461325e0985a66b6efc608c3647687f273920aae9bf7936d316f7
File Path: C:\Windows\System32\certenc.dll
MD5: 1f23ceafb492c0dd78a07a0059d10eba
SHA1: 52303918866033238aaba53766e00b55fc0c7492
SHA256:902646c722ea456bacffa8f748130551ca6398bacf4130989b6f3ccb7a69e4d5
File Path: C:\Windows\System32\certmgr.dll
MD5: 4874b9b0d98b28164c8eeaa3d42afaa7
SHA1: ec2d3a243ce1b5174e7ac65ab0b594569dd85747
SHA256:2ca83e2a701ec79371d9fa49e96b6bb2cf96f44162a213a9b753c72f19710448
File Path: C:\Windows\System32\certprop.dll
MD5: 632f6f4186faeeda042c01837113dad2
SHA1: 3819a9c9ae16656a2b6931b1c3f5c5f4ebfad1fd
SHA256:9db3b53a1d69b182a52428b9af3585127f40b88674f5dd28764ccf4da664e15d
File Path: C:\Windows\System32\certreq.exe
MD5: 5ad59278189bec8afec3c30e87b82073
SHA1: ef0d05cc78f15cb924b71d89f4518a7803b7a921
SHA256:54fb71ebd64c773ca2f6fb4f37a47bc327551aa75f24de7492aee18444159d13
File Path: C:\Windows\System32\certutil.exe
MD5: 663d83c94490e45feb8756f199f0a5c2
SHA1: 04a77b9e8966e69b4d54c1cd6fe6e1fcce554082
SHA256:87ade035f74702cf14fea143a4505e8cdebaf941f1bae116772b5ef65a77c00c
File Path: C:\Windows\System32\cewmdm.dll
MD5: 7c9fd203ac97e3466fca53f166f4df63
SHA1: 4ca87b7c37a6a572a74853af1f6f3ec1d706f9eb
SHA256:510568dd711326a167c6fd33524080574653bcd96a95a8a92bb8bddb4511670f
File Path: C:\Windows\System32\cfgbkend.dll
MD5: 0031c4f20714448786e57810bc97a235
SHA1: 9f50c2afbb28d5e1d03d473c2b506d1f4223a90b
SHA256:e1433ffa9a244fa31d48417fe6c8f1d10423862d0b0aa596fc2a8667b432976d
File Path: C:\Windows\System32\cfgmgr32.dll
MD5: f90b57d5bbd5a484d2b60020b1c299e8
SHA1: f3711324608e2f30baad04c6bc98f601f3aa1a19
SHA256:7fefd329b398827d6babf33973eaa2c0dc580fe1f3b291efa4793e795e4df8fa
File Path: C:\Windows\System32\cflapi.dll
MD5: 69b3169911f4017c6db78d9798676e35
SHA1: 757722cd0c664a5438e64a8a5c02c6a1adee7983
SHA256:72ee7011fc8393c8e1d2e882a62a0b20260721e147410248c547ffcde69d2f19
File Path: C:\Windows\System32\cfmifs.dll
MD5: c947fbc53daef272712fbad8e057a623
SHA1: 890e89b1cc6e7ee5e9dadf42f7047a189d291bef
SHA256:bd500a978b4f812dc43963faf92bcc2972a0d95ca4d4b80d84e7dfd4878ab09f
File Path: C:\Windows\System32\cfmifsproxy.dll
MD5: 67b423f3fe59ea797f8fa18610e19e5f
SHA1: cd5dbec229f0958e985cb36b756ba701a36e09c3
SHA256:d78375003c5647c0efc1b0bbfc79a5ed04843b161f86d639093249c3123514ce
File Path: C:\Windows\System32\change.exe
MD5: b5a2475e90b9970f16c50d392b9a16bb
SHA1: 0fc5eaafbb93c2d1816f0fed0e1d5b2a3ae57373
SHA256:d2df044b73e57cb2ffab4beae33355301b124b7ca45861c683b97d376019d717
File Path: C:\Windows\System32\changepk.exe
MD5: e7d26606039855e0e2f7582447fb1eaa
SHA1: f3b9a9686ea47ce78586594fd0d9f5e6a86ddb95
SHA256:a860b3a62db1673a607f3eb3251e1e2d0b9a53409d06ce488186d88dde81097a
File Path: C:\Windows\System32\charmap.exe
MD5: 13eed870bcd8052bce783b2d931a553a
SHA1: e287f8bfaf34bacacaea9089f95dc20db8300c02
SHA256:665d0ca155d4db485a3022692016c8d3a224067550d301913186951252854c35
File Path: C:\Windows\System32\chartv.dll
MD5: e8a51aae0f80c587511e552d3cb23e74
SHA1: 222d8daab6bf56c9f6e6768b85cb561517f31082
SHA256:77eb00a40ba268aa73a8ea6434161d0a3df11416f427360cf2aa6a7a10b5384a
File Path: C:\Windows\System32\chglogon.exe
MD5: 96c637283d92573c121b34513c267987
SHA1: 1556fdc9ee7e3f8c8729932e0d5e660dfd69cc53
SHA256:a9cc2b03783896c6596d8f4e4cc3db555a9096264bc8253478d1f0f0fbb2b74b
File Path: C:\Windows\System32\chgport.exe
MD5: c00b03de19767654c9d9f69fe825edeb
SHA1: fbd6b69654d9b75a6f828ad56be8c28bdef747ce
SHA256:e68aa9ecd4ecf58618ef794a9b493b5d070ccd5b435b7b850c95a3302c39fa59
File Path: C:\Windows\System32\chgusr.exe
MD5: d686812456a76d1fd64334b1967e5051
SHA1: 4d3d670b1df78a805a9601ec861f0b3b874f344c
SHA256:074b4a36e0cc697e4146ea3873bfd25ebb067f2a937930e4d8393340f84f0d32
File Path: C:\Windows\System32\chkdsk.exe
MD5: 7a5061e14cd532a38c926aa7002dd205
SHA1: f3a199547855fa4c35b1906dbfb66e2565dab460
SHA256:f3f0645ed6cf3421520787846a8d0f66367522b4ec2c34021a1a11373d229712
File Path: C:\Windows\System32\chkntfs.exe
MD5: 899ca96bf3ef67bf03808ccd7fc8f8f4
SHA1: b23b32225cedb14aa43524ea9e00bdfdd61c6080
SHA256:b11778898a18c8a6a24af153743060e1569f443ad73943bc4292eda844c80e2e
File Path: C:\Windows\System32\chkwudrv.dll
MD5: bdc236a104a630c2c172b7e14ed8c64f
SHA1: b652b8cc89b32a2a58cb61eae36b4a58042ffc82
SHA256:6c423b66f5ea8985ca92c92aeed9224865843bbae30fa9da0eaef23a88a06a7a
File Path: C:\Windows\System32\choice.exe
MD5: 1a9804f0c374283b094e9e55dc5ee128
SHA1: 145f6745c02f5efa23a411b5f87fcc995a4d3856
SHA256:b2191c32538842d3fdeff972e5a77527fa35d69fa400aad2aa2798b86fc6cf2a
File Path: C:\Windows\System32\chxinputrouter.dll
MD5: 4d43764c690487704c5048155512cfa1
SHA1: f258abbde3c3eabe748636f138a8e8031757106a
SHA256:192a509901454d726c3a9d01a778a0aa523cd11e0df3bb5669b433efbff9feed
File Path: C:\Windows\System32\migration\chxmig.dll
MD5: 10950e91aab8e4013cfd00920dbced15
SHA1: 415de916d265e595b67b4885cef62bb6a98994e2
SHA256:61942df23a20742b2d8004293624f9268430570c122f04ae0d1eae3978f5883c
File Path: C:\Windows\System32\migwiz\dlmanifests\Microsoft-Windows-TextServicesFramework-Migration-DL\chxmig.dll
MD5: e0f75176cb3d5a7a34a5133d82ad2c36
SHA1: 2ccc134ebad7a1221d0f89b8983fb15de1290920
SHA256:7030f9d33cdec2e9d3054123f0230efff68f0ac7479e3c09125a1b39ebaf5628
File Path: C:\Windows\System32\chxranker.dll
MD5: 2f82109839d7fcd92ff94ada77963473
SHA1: 6ca4bfa8d7dc752ab4c9f4d7d1503640843e176b
SHA256:5878b60c82154e715c31e35f0afbc57567597333be01c190200647031b4c592a
File Path: C:\Windows\System32\ci.dll
MD5: 1187f52c84afcbcdd66c13592dd647b4
SHA1: 03cfd3d6e034f3627760da121a489a0306b8797e
SHA256:0a67e258a2e07be75932619f9411c6d63071fac284910297b84fc418a84712ba
File Path: C:\Windows\System32\cic.dll
MD5: e19e8a4313b7396c90c191c29a4e24df
SHA1: b31fa8c0eca6525925c655ef26734e94d2bf7b65
SHA256:ae68c6a900fb899359d6e70f403274560faa7e8864933d0db3fbc8207b983548
File Path: C:\Windows\System32\cimfs.dll
MD5: 0c4af93807ad873508ff5efaadcb2e97
SHA1: 9c83c104c494bab5344883b49857669f36d69fa7
SHA256:83872fbfd2c8f57ef7f65ba6e0443ea8f29effe63fda6a4dc00bee87e5987c12
File Path: C:\Windows\System32\wbem\cimwin32.dll
MD5: 46d016bbe5694ddcea1e6c8f58016f02
SHA1: 4baf0fa79d15d568a00037aa77ee9572eda92897
SHA256:1dd5a5a294785172b9cca8e759fcc53d4684bb85f985050535a5d357490f8755
File Path: C:\Windows\System32\cipher.exe
MD5: f3471ddb5ae8e057f1b908a50e4aad7c
SHA1: 12b08c7a6a36d5624c2d7f40784c26a3607fa89b
SHA256:a6b2cfde3e3de872d9edd6a16710ed6c8ee32a0dfcf57322b27b3da8d18ae71a
File Path: C:\Windows\System32\clb.dll
MD5: db9b92df3ec412c4976c605cd2a6636c
SHA1: 8e8146346ab7e0e1fb11cadc623ad083ecfe39ce
SHA256:07f6396cc99ba305855ed510d4193bd274552dfcba44433baf6e519346c3db8a
File Path: C:\Windows\System32\clbcatq.dll
MD5: 94a96f09f2a95f21123721d0a140c3ec
SHA1: 1650dea8d89ea7cf41afd1a0f25a182d9e6f10a7
SHA256:af30c5fddaf675df238f0da108843367b1075fe691a76b6642bf8595b62860cf
File Path: C:\Windows\System32\cldapi.dll
MD5: e2094dd97e923e8a7abde0613b4f1012
SHA1: f83aa9edd13e883c3e541e4c9a075515a23adaf9
SHA256:6285f95ae8555a0503486c63e8b261f84731c20f794539f217e7d31124820eb8
File Path: C:\Windows\System32\cleanmgr.exe
MD5: 4056d1e394727c39b6822bf633d45129
SHA1: fd192e49c2fcc73f6ce63457f8dc84e767ed8038
SHA256:f88a9e185a8f5d29fb2b45b20de9de44aa7c98411805e44b44697645b0c4b9fc
File Path: C:\Windows\System32\clfsw32.dll
MD5: 715d5f55c61ea3dbc53df1ba9cce2045
SHA1: 6a7dc044137255804f81b95e70d95917cc903617
SHA256:3db655cea75b9a58ef6cadd339a215c1cbe2de827711dfc31457d304593f1ac3
File Path: C:\Windows\System32\cliconfg.dll
MD5: 2018592ef19bf65ad701ac836ff55d11
SHA1: b7e6bbd8914bd654f665c581405160e46e9465f1
SHA256:25eac1a7ad0b7f62a251a9ccb90aef80edbcc8434c63e28690c153d7a8efb97b
File Path: C:\Windows\System32\cliconfg.exe
MD5: e06c0d21ffe629d45e3f0067b86d2cea
SHA1: 05eea2a01a7b63b43d8f465d190d206a890f3f30
SHA256:5b223b5bd106ff17c7817858cb6c371a055b54486e4c351ca952d6cd83a2da88
File Path: C:\Windows\System32\clip.exe
MD5: 50f2cf199f2eb26d37403c9d7268d81f
SHA1: 1deaa1cddcc528d30749dca3cc410ebfe9ade6c8
SHA256:5ad606bcbbbdb95dda19c955e4129b436295cac249e2370fee3d0285d387cf55
File Path: C:\Windows\System32\clipwinrt.dll
MD5: 16065801da732778ebe555236222e7c5
SHA1: 4db4f83166aa29b367bcae3c4f8ca3ea9e6c5bf4
SHA256:13335333484b562979d1fa029061fe0a469ee4b5c488512aa9a8fadd5d678542
File Path: C:\Windows\System32\cloudAP.dll
MD5: cbdd3be8e53960250443b16d49eb34ce
SHA1: 7335132a46371e5103df3037c38af4b37301dfe1
SHA256:161199bdebf29763466cbec3d7c099fae8f2cd98b488b0ec6c32c435092ce389
File Path: C:\Windows\System32\cloudidsvc.dll
MD5: 63f3cb7bc6711284e3fce6fc51393834
SHA1: 4b84e5f02aa3649c3808b993aed84da4ebe144e0
SHA256:b87867759d050dfb223393f5b31415320625798d81b62f03bb621e69ab51f78a
File Path: C:\Windows\System32\clrhost.dll
MD5: 5e23559aac2a0fe3e5e35fc1124cc73d
SHA1: d3c51da941489f7a9d062a2ecbb9319d9bce0085
SHA256:2d51e6e95c92776c4217aab5db68e1e464ea73fae27c9825f3ee5241d634b870
File Path: C:\Windows\System32\clusapi.dll
MD5: 3f323bb466b88bb7d36d887a60e33c85
SHA1: 8c6083efc56d1edc728eabf26add840e2b981708
SHA256:5c5cbf1043d2b9a7f8c8f56b71fcc0b81497f524eefb70510cca9b7fb7b8e7e1
File Path: C:\Windows\System32\cmcfg32.dll
MD5: 4efa524ad071b9b5c61b6974abf95d81
SHA1: 63badb19ee7877601b6e15918ce05906b27d86e2
SHA256:460e3eabb7400e7cb5e00e6b74e90da19ec6eda622af27fc76a662d9f3ad63c4
File Path: C:\Windows\System32\cmd.exe
MD5: 2b40c98ed0f7a1d3b091a3e8353132dc
SHA1: df79c86fdd11b9ccb89148458e509f879c72566c
SHA256:badf4752413cb0cbdc03fb95820ca167f0cdc63b597ccdb5ef43111180e088b0
File Path: C:\Windows\System32\cmdext.dll
MD5: 060c4782dfe9c028c0a4734ac77be887
SHA1: d6cce6fb03408c82e61bb789291fe650d289290f
SHA256:302c319871bda4f4e26229b2e834ded819e0e16753d6e387f1bf4c3e2155052c
File Path: C:\Windows\System32\cmdial32.dll
MD5: 1456d404c616950d8bf40a002c3080b0
SHA1: bc6295fd8720b80c9099903a73c490f70b290435
SHA256:d3d6bd3c23ee226771c93f5b06649cedd169075186ff84ff29fc055e0f502ef2
File Path: C:\Windows\System32\cmdkey.exe
MD5: f9c20642b4cfce4517f4f26b6305607c
SHA1: b0de4d5f0e178002e02c66daf064dfd3ff1dbde6
SHA256:14bcc1901c5cca8e91a6400050308752916ac861bdd52cf3a44dc7ef46830282
File Path: C:\Windows\System32\cmdl32.exe
MD5: 77b22cea6688a005473fc4896910924f
SHA1: 5ccf7bfef1e003644e7df2c226d76b1b31c4ddcd
SHA256:28a7ff1ae045eb1fe7ed6a7dcd9b2212411c449a8afe0e652071af48beac610d
File Path: C:\Windows\System32\cmgrcspps.dll
MD5: dfa5e84f7aca40b5ed71ffca91027af7
SHA1: 0b5975eb801dc5de127cdf1d5180ceb4c9af4f04
SHA256:4fe892a4966101cefaa664b666a9429194f4e09d577f254fb4fb9d5418d9f314
File Path: C:\Windows\System32\migwiz\cmi2migxml.dll
MD5: 04b2b0322f0602484a59990dd2f70770
SHA1: dfa565a4e167cc2e7c5e292a979b8860d3f3cf6d
SHA256:2b2cde410fb93040c6700076c220c2a3785118dee76852ea283d72337b72c20d
File Path: C:\Windows\System32\cmifw.dll
MD5: 9c09bd9bded9bbc79a9161bd99f4d346
SHA1: 1e89376561855f79e25be90e1952a64bb6389d98
SHA256:434a74399a84cad48d3085d24c6d851eb5b4a6fc436775326dbf2750f59c352a
File Path: C:\Windows\System32\cmintegrator.dll
MD5: a5082624a4cdfe0c5a72e45b9647f565
SHA1: d396b9ca8d2a718b156be8881df82ee636a0c491
SHA256:6d3dbac1914b148b4be04449c53b3ac6d42e4466a83244ab71dc2e6082befc53
File Path: C:\Windows\System32\oobe\cmisetup.dll
MD5: b65261404c738d368ccbe14aa917cfbb
SHA1: 6b2778554181b843d552e103ac8d9264eaa6fb96
SHA256:0f680ef58076c052e7ef628371b7a63e33f57ed153b37638c539d68efdf1fa5b
File Path: C:\Windows\System32\AdvancedInstallers\cmiv2.dll
MD5: 61f84e6c96cb85ecee72ced2811c1dbb
SHA1: dca2b6ae67512357246f24d2f6b638d77fd5391b
SHA256:72b05486b744a4e02db3f2434c1671989536de2eea60cd30769d91740783a1a4
File Path: C:\Windows\System32\cmlua.dll
MD5: 151f91834cb95938c495a5cb569e6c8b
SHA1: b39d7f63f4888ccb21dd1739c7508891ef4b5c2d
SHA256:d00d1c5fe0268b650abb16f3d66b469c049066e8c0508df64801749d09f312a4
File Path: C:\Windows\System32\setup\cmmigr.dll
MD5: a8f16d638f620d8254143ee901a2801f
SHA1: 7a4cbeac8f01cd9d78e24e6531d192c9be90dae1
SHA256:b87f0a07154926b1eda3a388d2e02783dde9a9ff1ea3bc27ab35443f0c07aafd
File Path: C:\Windows\System32\cmmon32.exe
MD5: bafec2e2ca3d475942e001907b9597bc
SHA1: 149a762fdad6e688823754413d50fbd69bc55fe4
SHA256:542d796db8372c7bd3f9861e0071ffadfab3e9b5cf49a9cdc975c5cb003f3d5f
File Path: C:\Windows\System32\cmpbk32.dll
MD5: 3dff4aeb698ea536d04128c26c59f83f
SHA1: 24566821a20d02c6295f4ac6d5abaa3ff7250f43
SHA256:967d7b8bf5b4644553af34ea53f8184dcb414e2a7fdad2e3ac4e9e2c718c2803
File Path: C:\Windows\System32\cmstp.exe
MD5: 4cc43fe4d397ff79fa69f397e016df52
SHA1: 8fd6cf81ad40c9b123cd75611860a8b95c72869c
SHA256:f2d3905ee38b2b5c0b724d582f14eb1db7621ffb8f3826df686a20784341614c
File Path: C:\Windows\System32\cmstplua.dll
MD5: 7a4ed1f07118c4f0b05332d8193b1a6f
SHA1: 273e4f48941e5834a574c8714ded8be97c682f95
SHA256:3a68f514121ac288a30888c43c91c5c5352908485604c383fea42941c86cbc6a
File Path: C:\Windows\System32\cmutil.dll
MD5: d40c8eff790ebc751b2c4a5f1b41bc55
SHA1: 7646bf4f69f779bf27464ecb6016b2bc0e1ee1bf
SHA256:192cc092c2d5a67e26893234285d7c3cd200d3ed6df94f28d19c51b1e7e6d0e7
File Path: C:\Windows\System32\cngcredui.dll
MD5: 20ebbad016d2d6f93ac5a59d731534e0
SHA1: 6b0fcbcd56545dafca88a11cdd1041a71ecc60d6
SHA256:72131f7486914b7b02743334ede08a92df22132d4e5722488a756930778b9f0d
File Path: C:\Windows\System32\cngprovider.dll
MD5: b7f45fd3fa233efde01ed9c91ad7bcb4
SHA1: 68be50ccb6bf5b9224a0a12a6475498f77bd0559
SHA256:46b0def5697079f2fe3bfd461ef6a5084c3ef0a2bbef8a8d02b96716ea4b547a
File Path: C:\Windows\System32\cnvfat.dll
MD5: ae819eab0b58cb567bca13f22c0763a5
SHA1: 9a16f3f4bdd42ef96b4de8d55ec5a4d42b618875
SHA256:3987d018e725283fe10a4ffd70a9471dca77b1eee5f9d8403aab5cceaf176143
File Path: C:\Windows\System32\cofire.exe
MD5: 585a383a2d2f6c9466367a50caa1aff2
SHA1: 2c34288b7df5f1aefcaf6e23602193413a8862b4
SHA256:bb4b7c9197803404db85684a5db5528a87e1e0a9d1d6906a608f7fd6dd1659a8
File Path: C:\Windows\System32\cofiredm.dll
MD5: 411f52bbf0d5746080c12b8a28565f91
SHA1: 1eb5ae6a81eb4803e4beaca85ce2e9e2bee63216
SHA256:535c2c480084846895412581a89a59ab57c0e615f47d20023c702647cc4a83b4
File Path: C:\Windows\System32\colbact.dll
MD5: db489c24acbead060882089f18bd2db8
SHA1: 892e7c070e94bfadacf71b36563026b7f2b61e6e
SHA256:52e14269f544395fb59a891e3bf9abbdc5385aea5fde509db75d75143e67c53c
File Path: C:\Windows\System32\coloradapterclient.dll
MD5: 35d039936d660ed89cf9edc2a67ec489
SHA1: 98e27d35e906402f7054f1f3452bdc386c49079f
SHA256:844cd0b027678932c43b263d8dfa1131969b80135fb259fd570699821ebbda89
File Path: C:\Windows\System32\colorcpl.exe
MD5: 7009947cfc65ea513ed9ebd37ec63c62
SHA1: 62b0273cd43e21dc9e55a100be1f7c52d6c5f249
SHA256:86c19bc9523fb84eef1a18af66aced909c32fedbad9988397a8367a836bbb2e0
File Path: C:\Windows\System32\colorui.dll
MD5: 102a7992a33e9ca49d9fafa175e81f2a
SHA1: e7092dede941e6e0949760d7489d2b6f26dc460b
SHA256:31fc649e6928843bc9b6818367dc0922252be4b6a607d174be95588ac2e48857
File Path: C:\Windows\System32\Com\comadmin.dll
MD5: 05ed9d45b0368c5b6cb9f3fd3835d13e
SHA1: a7634380aa9827d927f5fc1ac15582c1e92f370f
SHA256:fad0f295740a104a1c988f630947c1aacef1cf12f9e4b70d41c2930a4990aa6d
File Path: C:\Windows\System32\combase.dll
MD5: b104c481313e49c5bcc036c03ecc4a67
SHA1: 5d8a9cce16b7928ceda1f931ba20bdd90bd7346d
SHA256:b50a09b7f91d8e11b2f3a6191d2e4651898166cb57dbd28b4bec40d11b179fd8
File Path: C:\Windows\System32\comcat.dll
MD5: 835ff05a3f5e16e0fe41e515ea398bd4
SHA1: e025cb17bbb01a1b5715ebbc745272a8611dae6c
SHA256:8dcfb1e6aa965df4bd4c0551d03bdfd6472c80219ada4671910958688fbb4ab6
File Path: C:\Windows\System32\comctl32.dll
MD5: 4705e615a6bd14cf8a8e63c38ccbddf0
SHA1: 6634d8df76ee4152cd0f32a58f63b028ed1148a1
SHA256:3015a373ba7eac57a2ccf2bf7f5577262eb0a1cf2402381c0e0385c4d5963c57
File Path: C:\Windows\System32\comdlg32.dll
MD5: 9cb6537e6b9918d834b5c0417538b199
SHA1: ab8b1d8e292375347f5c03f58488ff0bcb65d073
SHA256:ae9a67987123ef55e4f56b7f137bd949e069f64227219434a78e8b0fa4683ab8
File Path: C:\Windows\System32\coml2.dll
MD5: 0c6147b2d334519f261390c410ccdad5
SHA1: ad5b63dffa5cab3edb546aa24f66931a3e67c25b
SHA256:c194e0f86ada728d2ee3551e5cc223322017ef472eda006729f8e7ce57267b57
File Path: C:\Windows\System32\migration\commig.dll
MD5: f023ba99f3d02409997990c18cfc3a20
SHA1: 885b797015493a3ffe93388dc8e1b8bafb8582ec
SHA256:3496a2e0151aae65adeaa3e3c7f6baea73b289467fe261b5fc71860a9de5c485
File Path: C:\Windows\System32\comp.exe
MD5: 18f8a8d83533ae93382e6e4c236405d8
SHA1: cd6bbe67e0b1675ed6cb93af2a9a14e09c233480
SHA256:c2729cbcb6a723939ca111c7ee82bab30856ec8d728ca234459112b975b9f306
File Path: C:\Windows\System32\compact.exe
MD5: 278549bbd0ce09f011c1b8481576ca0c
SHA1: 8ad4ff0884ad295489495edcceecaf2595d96ff3
SHA256:6245640e75e1e55af426f8d9a779b8478f8034479ad5ca7d49e5bebeb823b76a
File Path: C:\Windows\System32\compstui.dll
MD5: b0771144ab94489bb6a7da6ccbece98a
SHA1: b068aecdacf241acabee0bd52c54c432c1defcbf
SHA256:f7a4a5243ee0e21bf426c77b0d3aac27afb4a2583102358040b6bcfd189fb2ff
File Path: C:\Windows\System32\computecore.dll
MD5: 751ab2a19e9ea640bdbbf5720f5c262c
SHA1: 6d32510e7c61465306f29d2750f98afeb19cbe21
SHA256:d5a91f2fc8e3bdf39d66a90a9f79f420f1355a032e831d61f7f46c6925ebd9d4
File Path: C:\Windows\System32\computelibeventlog.dll
MD5: 90c4785e1f404b970896bd16a0ce8cbb
SHA1: ae7845c428089fd6a7f091a0ed317a59ed951aad
SHA256:495097c6398a41aadd8116f40eaac43fb43275d0a045cf4432696abd6bd0cece
File Path: C:\Windows\System32\computenetwork.dll
MD5: 9210df47729c6b2a705cef31462e05a8
SHA1: 7fac8ed3664fd78b3e60cdd28824d96863931496
SHA256:f105794651989bc06bb675247ba01fcd330bf9e7be7c84fabd822994887f9469
File Path: C:\Windows\System32\computestorage.dll
MD5: 50e369175530ae80e235df5a240908d9
SHA1: b780235af4d2dde9b07c2d9b5a9e44e21e8369e5
SHA256:27378237009c23ea9a849e1087388c0827cf049ddaae2f1d3b4f0c3101081d5a
File Path: C:\Windows\System32\comrepl.dll
MD5: ff404f3b64301e1365e2fd916600144a
SHA1: cd16f6fe3683e93dc3037b1b493045e111edd77e
SHA256:336805b06a02831003536cba10182cbd685bcc6a8e5567b9540136b0b61365c0
File Path: C:\Windows\System32\Com\comrepl.exe
MD5: 920731b00424e33934ad8bb4a923cfe1
SHA1: 315f6df5c9059a1fa40c19eecc3e102f41598309
SHA256:1a9b9b536a195d25f0b97b741cf4e44c22abef8b0355bf8adc8f5c176b74204e
File Path: C:\Windows\System32\comres.dll
MD5: 594dc05001c49200b6617fc002b9d271
SHA1: 93e7b081f7dec0e6ea40ee7959c48fb9ad252084
SHA256:b10acd7aa94ffa1155816ebdad9e11f0723b1676a214d9a02306b6f7141f1325
File Path: C:\Windows\System32\setup\comsetup.dll
MD5: 5b77a2ca50ff4bd7a8f3b830b0b8962c
SHA1: c6e4df1a16ff70d951f3949039909a720b238cb6
SHA256:a37689df6df071bb90f0348df5cd7d4e897a746b975ff11cb434cb3c821391e8
File Path: C:\Windows\System32\comsnap.dll
MD5: 804888fd6c81aa6f8f7e79b6df298e8c
SHA1: b36ad3bf477d2cddb9e99bd3a49b281f1f3edab1
SHA256:8b9e42f4b911d6a6787811546cc004d0a8458358717ca2a067de52bd56ba6a06
File Path: C:\Windows\System32\comsvcs.dll
MD5: 29ce7bde8e849433f739d909282b4e17
SHA1: a3e69cfc9eadbffc1d3ecae5289b2a08fedc4535
SHA256:3c58d3afc08c38b55cf272cc5c5583f5b851bd2e5e6e0fb0f4c657c7dc1ac7a3
File Path: C:\Windows\System32\comuid.dll
MD5: d1de7f40bb3530d1ef94cdcaa6c7e750
SHA1: a2eedc3f0146b9e2ba89c43f6942b1ada4390551
SHA256:a29589f15361712e3942010ae5942e7bcd126cc915f4437c42eaf3455750c03d
File Path: C:\Windows\System32\concrt140.dll
MD5: 23f1f4021410ec9ad0d1d384db019b02
SHA1: dd7e1bd24e0fb906d226639cfcf89a7fe3346181
SHA256:2556b827690e4598b5eb655982d996a4fd85b81bd182a56aa2145769b3fd4da6
File Path: C:\Windows\System32\concrt140d.dll
MD5: a13072a04e957bd8023f5af26d32394e
SHA1: 0b61d509c8beb094043e5b7a977da0f255a5ed15
SHA256:89dc5ecc0f81ff5741ef344d4c29494bc38bb17bc40e701c049b0d0b281ab8fe
File Path: C:\Windows\System32\configmanager2.dll
MD5: 998b0b34730eab1a7eb52d60af69b9b7
SHA1: 2ece542b2a4cb789e71a36b930e18d814cf603d9
SHA256:b25e501d1c6ff13bbe7f8b08791e415456b44a81f520e813cdf0cc101f3e44bd
File Path: C:\Windows\System32\conhost.exe
MD5: 0f568f6c821565ab9ff45c7457953789
SHA1: f948a4c5e01a74b17d0f966615834ba76dc1badc
SHA256:cc0a60cd15fa21e54615e46cd0f10cfbe86f496dc64d14b31d9f3b415d120ee1
File Path: C:\Windows\System32\connect.dll
MD5: 818df5be393d283c4bfd415466a1b2b0
SHA1: 959d2882985202302bdc2c8920a5f3d0f550e294
SHA256:c0d73039741fc9e7b6d4889ccdadd37ee2542af6b417acd1a6a0178212e95c97
File Path: C:\Windows\System32\consent.exe
MD5: 07eb4249e014f417a48bead8592ba686
SHA1: 0c2c478a6ff2e61dcd5d01afee91b01ca81239f4
SHA256:26de462fc57f7f99cb5105ab6278594b6390f4ec8daf3cf400db46ea60538312
File Path: C:\Windows\System32\console.dll
MD5: f44a7a9c7fd1d8fcaf9a9bb286e01b8c
SHA1: 6b46307b3cff724fecec4f89a9e24fe6e9d6f2e9
SHA256:122d6369e7e64adcbeefcdb660b65a0fcaf7e8735a448b58a0ba60274cc98806
File Path: C:\Windows\System32\container.dll
MD5: 52170482686bc8c7c62501c1a334491a
SHA1: 9a68556594bc4cfd6c74d7de5eec555ceca91d0c
SHA256:897a7025c5201013a0c5663d64dcc402f2bba40cc4dd8fe6e929510c0dc597a3
File Path: C:\Windows\System32\containerdevicemanagement.dll
MD5: 1471b667aa0cbab11ef42c65953bb38a
SHA1: abfcac60d535fdf0cec073d2c1a8ae96c5dbd5f5
SHA256:69afeb35574445f5fcdd1ab559781fc55fc8e6adbcdcfd5a656224d91e166ec3
File Path: C:\Windows\System32\control.exe
MD5: 8132ae658079c0caccf3d25ecffa4adc
SHA1: 185f9c1fe6e698cbdb64dd9e4893f4a86ac053a5
SHA256:23dc40444364de9e911579a301cf91be3174045234713601f8e85a983afc1107
File Path: C:\Windows\System32\convert.exe
MD5: 7428f525cbc2ab967913609b11125506
SHA1: 1c5d5e33612b2983fad12b516df5cd7ee192c16b
SHA256:9678122abe2ffeda75912da16b188c755b7517ea1da8e51bba38934f2a5d3252
File Path: C:\Windows\System32\convertvhd.exe
MD5: a861eacea746a7a43a15a6d568c890e6
SHA1: 5a661a9946d616407d386c159e66954e45c19961
SHA256:597217943e72e2eb810ac90f0fc157c0d9c77f2664953cdc60078482617e927e
File Path: C:\Windows\System32\coreaudiopolicymanagerext.dll
MD5: 891b4bd2f2557bb19733b4be1d398e2d
SHA1: 403f5e8611a055edd4858a190cbfee88c3b3897c
SHA256:6fcea7d8ad90cac35b4f37f2e2d0a73955f3cfe0f3ccfb5e09c58f46c35ea066
File Path: C:\Windows\System32\coredpus.dll
MD5: ba46708d4cfb6099c66aeb649c44caab
SHA1: e87bcb8bee28697e8137d497531eb77394a53c54
SHA256:19ef2b00b2efc284287dfeba10878a59d68f683574f08f5de9cc3d188a747cfa
File Path: C:\Windows\System32\coredpussvr.exe
MD5: c1537040e259da44813a5115a67ff6b7
SHA1: 4eb284630da8a6c096c6f60b8cbf2842462194ec
SHA256:b3e809eec1c2e0a134c1db8b45cb56d86a8f3cdac63e8f16958e1321fb1ea22a
File Path: C:\Windows\System32\coreglobconfig.dll
MD5: 8b4e6e2a281b70839bfcfb85bff067d0
SHA1: e2f4bd5c0f90ad66808420273d02ad21cd09e7a4
SHA256:b63ecebe641066fdafc17cc7764d25d16bdc529a5d870ebb8733b67967c42028
File Path: C:\Windows\System32\correngine.dll
MD5: a21d1052c43332360f90dd63ca5f2950
SHA1: b85734cd07b3fb37e8a86850894690d83bef01f9
SHA256:1a94de833099c9b90b180a3da0b0809a3beaa5f21f6fe40d843d5c5b26f6f3f0
File Path: C:\Windows\System32\credprovhost.dll
MD5: ed264a4666e862f92338349df1abc2e6
SHA1: 125e95dafa488d1ec4e84c528e312f02e3fe4795
SHA256:b21f635f02e7428fe2b3989b222419bde7076a8ff99de45f92caa40c175ede02
File Path: C:\Windows\System32\credprovs.dll
MD5: ff0c78fb36e5a4ecd8aa0628c1b01768
SHA1: 1bb4a6ec67321eecb3882baaaa7b910e78315026
SHA256:e4827c44245b29ec77a446087671486d7597ae8401e75462be292a56f05417a0
File Path: C:\Windows\System32\credprovslegacy.dll
MD5: 5326c31492bdf5665c2904401eb6ac5c
SHA1: 7e3333f93a708c9d5dfebc84ea073479507780de
SHA256:0c860133042bf7f50baf43cb93517b4d318f59b67cfca8fb6dbe65201813cb99
File Path: C:\Windows\System32\credssp.dll
MD5: 89d79d437a73973f7069b8de92c41b02
SHA1: caf694fabd5264fa67793db68ccb71e70c562db5
SHA256:d3e1c10fea999cb21878de0aa383fac441e7bcc5e058e540abfb1cc685bd41a0
File Path: C:\Windows\System32\credui.dll
MD5: befb2fef92fd621e309f426e447b867d
SHA1: 7b8c6fd8c397219a569145172ddc356e46b36e10
SHA256:dc83991d180ea676d15a71fd67748b0f99e520fe96ae401e95fe9b26ce355c74
File Path: C:\Windows\System32\credwiz.exe
MD5: 19ffb4c1b2042def14ec20365cbe0e7f
SHA1: 3c0e69d8ec422545438fc335cfa26cf18579264b
SHA256:dd73d0adbedf9c251c055081279cf152e3e84197f91024474efd4d23fab3c6c3
File Path: C:\Windows\System32\crypt32.dll
MD5: a657ccf1f59473579631d964b070990a
SHA1: ee358832f51db50b03853f93774305b4e1adfc20
SHA256:0f64184810e2476e5916bed21fcb7736270cdc1807531ebc76edea8839d2264f
File Path: C:\Windows\System32\cryptbase.dll
MD5: 8e85aa14b1f14c5bea42263b5a14dedb
SHA1: cf8bc094d0be9660df75f20cc20f023f9258d45f
SHA256:f2904441a36aa3bb535e42a6ab2dcd004fd84564a0e5a85cc42c8a54af6176d3
File Path: C:\Windows\System32\cryptcatsvc.dll
MD5: 43a8e6fe5a3c98e92484139c2bc85855
SHA1: 838847b016b54184fc878f0d476caaa08b366e61
SHA256:cae5bacde710aee1f38a45d6417e8798aec142af9c2969306a45389acf4f1675
File Path: C:\Windows\System32\cryptdlg.dll
MD5: da4fcd5688dcb8915c776adef05bc945
SHA1: 7760e6068942950cbb1a559a3d5f97f36b818493
SHA256:3f3c393c4e51925e170e6a60b405e7410d4fe2646307ef9ee533ab6d1834033f
File Path: C:\Windows\System32\cryptdll.dll
MD5: 2601c1e94447caf9667fef9418046bc8
SHA1: d355576beb6d4dd6f5652a21a9e89c065ff9f284
SHA256:ebbd0be9471ddf1742222143b15da3782e5da2351d3b02be74f28a58c437903f
File Path: C:\Windows\System32\cryptext.dll
MD5: 7d323d0fb9432ea1c582ef590db4bf5b
SHA1: 3380e74dfe4ba3144902138170ea189d266b0ece
SHA256:e366dd67acc45d79c550144e1d1e316d34cc67795536e3cdcdf93a31a383c815
File Path: C:\Windows\System32\cryptnet.dll
MD5: 2dda0cb5dd07a0d4288b25cdbdba35d0
SHA1: 5e82f9de560659451ef30fb037d7076d52c6b6d0
SHA256:35df0e68d06bbbdc331c3c6d02d0ba0717be320f6b657852e651bbed6f9662b5
File Path: C:\Windows\System32\cryptngc.dll
MD5: 44ac6751078ec7e1559849ac3618ca55
SHA1: 72c632f0ea732a9c9fca01375ae72b04657a9b71
SHA256:9e8171b1d9a0359f0525442bb39f8deb09c67bba6604bae4debbc5f69a9bfd68
File Path: C:\Windows\System32\cryptsp.dll
MD5: 96848d64c8a1f38149722d97397d29c3
SHA1: 380342939f118db42456ff088a5c2ae64d2fcabe
SHA256:08b2d7415123d1a4a90bc64bc708b23a9d8c2d4adecbb12f102693397c8d87ef
File Path: C:\Windows\System32\cryptsvc.dll
MD5: 8ab3568419872d1a8a7b45153af7b3d4
SHA1: 83799b4a9c207db2815bee9f2f26ea725f7c4021
SHA256:5171ed876e0ec5cae2be9161acc90f4865ff6416efa376c82d8a5b65724a8910
File Path: C:\Windows\System32\crypttpmeksvc.dll
MD5: c07700df239f6b40b4f16af6debdedf1
SHA1: 7e65bae7d4221ba10aec9c648ba93a07744f9d6e
SHA256:a26546c262d0abf2cee93f5aefa071a96a1430b21415486a6656346b8fa41911
File Path: C:\Windows\System32\cryptui.dll
MD5: fd8d0549f29d4ee685d6ce489d8b7f6b
SHA1: fa1e13a1e4d85520be69927c2b617c6a45892b49
SHA256:5e266a2a4020e13702d91fe37d49bfd4ce3c6143403793bfdb8e0903411aa818
File Path: C:\Windows\System32\cryptuiwizard.dll
MD5: c1553ce430af75d6eac54f251cf3df01
SHA1: be2d9cbeb8ae53ab99ff37d9cfeb67120e28a0d3
SHA256:520a7db1ae36abdd5d7859dcf2623a615e8d014cd138a8f072e6818204834f8b
File Path: C:\Windows\System32\cryptxml.dll
MD5: 998b6afbde554716cf0ced4b4f1facac
SHA1: e8a348e1dcf70b6ac048d9e8c42a55e2955268ad
SHA256:86ae510e1fe8a49762c7d78b968748a13ae485aea135e2e9a01e96c8573bef34
File Path: C:\Windows\System32\DriverStore\FileRepository\modemcsa.inf_amd64_0ead899aeb6cb9a8\csamsp.dll
MD5: 536e354be337d6c2947f9b7567e186ee
SHA1: ebe8347e394337be89141ac951d206a6a759e65b
SHA256:6e17fe29d3e442bf021239d8566aa243761c7a0c58e1b9bf53bddd119b172a56
File Path: C:\Windows\System32\cscapi.dll
MD5: 5a2a91f2bf89aeeb9ce2bf315ae3242c
SHA1: 15d226849c7c6f5866b277058e4f95d4f330053b
SHA256:aeea7e32449005cd90d8a2883fca30869d19d0236c662aeb99a0ff71e3db535f
File Path: C:\Windows\System32\cscdll.dll
MD5: 1a781223a9168467cfcec137e09c535e
SHA1: 1665e9c0be91756edcafb6b776388e96412224dd
SHA256:91998404a3a0cf889f99b24703d86e159968c8c26d1276171f9594401ca6c23d
File Path: C:\Windows\System32\cscobj.dll
MD5: 5b02b2532457ad620ae1af602a907c79
SHA1: a4f71f68a7fb64baa680f08222d2958b8fe12a6c
SHA256:e957e92394eed1345641e1d2350f0d0c18c8d83d431da654984abb7aff76b14b
File Path: C:\Windows\System32\cscript.exe
MD5: e4f7dd1d8beb4cb690e2dca3d55a97c8
SHA1: 99165908c59905a184baddb5e83100dde077fe2b
SHA256:588ae8f59371598e379dcdafdc0e70c66492a1a998a37878a1626637ac1e1049
File Path: C:\Windows\System32\cscsvc.dll
MD5: 58b7834c67025a9b54a24714b6d809c9
SHA1: b94f832b60f90687b56f499faaa435b7fc19d2a2
SHA256:afc6511becf60ebaeaa5f46964e49d6b03de27539b76aa585402a254c27a6bd5
File Path: C:\Windows\System32\cscui.dll
MD5: b06b11e7fc6291ebac4b924fa0a9a049
SHA1: 17804caa4d5439a1fc16f3080447975ffbeffd97
SHA256:8960ad03b1d089c6d66b5a337c22f5c486c70a918fb4b2c57fb37a0dc974f116
File Path: C:\Windows\System32\migwiz\csiagent.dll
MD5: c9946cf1b93d79c97f73585bb3cf95b8
SHA1: 9e9df5cbe716832a336bb9d039dfaf6ef7fb36dc
SHA256:e562f7c50cfa80279e6258a1cb3f822931e94db25bddc8df9a13ea4835f9555b
File Path: C:\Windows\System32\csplte.dll
MD5: 862006dc73facea596592e57efa32b05
SHA1: 45109527f5005525d2307fcf6442f57645163f98
SHA256:9db6a969a8af6547af8ff780624549fd74dbeead5ee984a89403b138e0e6282a
File Path: C:\Windows\System32\csrsrv.dll
MD5: d6c9b4703bccc4cca879818089ab9a33
SHA1: a17f4389fa465aca4088a176dbdba6dd93f859dd
SHA256:31c66dd46da26c32d1457471e444e17ae05e222a2e39e895493bba983e1324dc
File Path: C:\Windows\System32\csrss.exe
MD5: ecfd9b55800aebb164a07d9a402dc9dd
SHA1: 43e2258320589c44ad6e8099b59adb0d9695fc8d
SHA256:9e63d657b41e13b75aebb261e7f93c0655d52ee82811b37e7470f4119e5b6054
File Path: C:\Windows\System32\ctfmon.exe
MD5: b625c18e177d5beb5a6f6432ccf46fb3
SHA1: abb864e1911c59f785b0e1822701b9a5ab31ba1e
SHA256:484fed5f039f429ed933931ba607b7efda7d1a343d79cfab60910e1843147012
File Path: C:\Windows\System32\cttune.exe
MD5: fa924465a33833f41c1a39f6221ba460
SHA1: 801d505d81e49d2b4ffa316245ca69ff58c523c3
SHA256:de2d871afe2c071cf305fc488875563b778e7279e57030ba1a1c9f7e360748da
File Path: C:\Windows\System32\cttunesvr.exe
MD5: ea3162566736d29f1d196f8108e698b3
SHA1: ce03bef3414030641ea5f3c958f4d1844bae8044
SHA256:d5732ee520e54c895b0f830e71fe7670aecd5fa2a66a6371a32f9b262f4c90ff
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\cudnn_infer64_7.dll
MD5: 0a94c3e74172734a8e78a1645f23736b
SHA1: 9164645797163c5ba61ec7f73b1afe6609d2707d
SHA256:7dfb4406efbf0dd715ab2d390eff1b29b1081563a820be6ea3fbf5cbda961a5f
File Path: C:\Windows\System32\curl.exe
MD5: 50679935a55f0805dc12a9188065dfae
SHA1: 81c324ddc98578136dbe7d2a8d388a2ef52a86f6
SHA256:2bbad800bc5058cad5631dbffd39fb8a293616479250c47b38dc8e8eb61dc3da
File Path: C:\Windows\System32\cuzzapi.dll
MD5: 90c4950890bdcc27822b09c7e203fa41
SHA1: ab585b409b652f9e74615c91999357986cea5154
SHA256:1fae31f25545a5fd2882e5d9082860c92755ea854ba2d963e4e21f9ae65aa2c9
File Path: C:\Windows\System32\cxcredprov.dll
MD5: 163c9985133175382e56bae9e8ae1707
SHA1: 93897248d8b8a1544752f74a384243c10b9f5b98
SHA256:24fa15c1b463915bbc50a6d1ea63cb2cfa00e663ef41e495f86c49c20bb0db16
File Path: C:\Windows\System32\d2d1.dll
MD5: 7c9cbe371bd9d7027901fe48bbf577e5
SHA1: 34dcb0e771ec0c712684ef5515e8001b1d30e740
SHA256:1f57c326f2dda4799b9e09cca380ecd8676de0c963bc35732197d73af4480033
File Path: C:\Windows\System32\d2d1debug2.dll
MD5: bf6538c4b5b5316e817da80db68a06bd
SHA1: 29c5ab5d09c5943ea724ff114fa6ab617259a8b9
SHA256:c331d4bae49a6edbece578c90fc4b12f2cf5a2612d69cd10b38894f51b99d73a
File Path: C:\Windows\System32\d2d1debug3.dll
MD5: 7f0c8cd55e5492f1eeb230b0d34e2e99
SHA1: e420f18c99d081c690a2d460d764be12b5e81f8c
SHA256:44e53db52322cfa68ff962fea67dd9bfe3922662faf1f0570f52b9ac7d3c4d7b
File Path: C:\Windows\System32\d3d10.dll
MD5: fa552e553bc532d12a3b10a960c82942
SHA1: 157229cd357b57f3bb5ed38e7be873c5167d841c
SHA256:1d9f93c65eb9166780fe019a6f140fb1e12ffdc5aaaf7572ba2f95da1c424f4b
File Path: C:\Windows\System32\d3d10_1.dll
MD5: 54e86180bd433af900da29bc65dc84df
SHA1: e187abe5e3c1d9d103e99de89e47d27b3a7c3bc9
SHA256:86f371bd23f0f0ed3422c14d2d34a706c42948d174b811d14cd15e6f76bab245
File Path: C:\Windows\System32\d3d10_1core.dll
MD5: ffb16cecbff42cee13c323e439798f0f
SHA1: a7e3d48d5113581897e707431a2aefc7c02ea2fb
SHA256:2b08b08284180b0184c8931972c9dd18b339ac7d8760912a4ce87df68decf5b3
File Path: C:\Windows\System32\d3d10core.dll
MD5: c2aadefa18b26204f1bd20d6ba60fdf2
SHA1: 0df45af0b2722018c160bae0d3a7916b9dafb585
SHA256:ecd286db078d0c61deb81a5df0886e36e0a4015297cf8ca4c499cbe102927175
File Path: C:\Windows\System32\d3d10level9.dll
MD5: 4a3f3a679604f82d80aea32c04730650
SHA1: 1f64b755373948e8e39955035ffae0a55e803986
SHA256:15d72ec4915a601f0ecc47c3cc3caa624f0eb9caf7e10536df3142e551fd32c8
File Path: C:\Windows\System32\d3d10ref.dll
MD5: 255a22fcfa68b8e6e7f392f45d6a7410
SHA1: 4e0d4f3ffdbd8cacb9632ba031e2cf7a7f182a2f
SHA256:66690e107afadea572f7975c770eb4c943d314b3ccd07893876b6171e3905e6a
File Path: C:\Windows\System32\d3d10sdklayers.dll
MD5: e00c89b7c637660e67f9e3491944baf7
SHA1: f0d456213b09e7309dcc931ac5042ce396f9272d
SHA256:d0becc9c01b8d5fd8137071935374f730f8bae1b76e420e93922aa815d01760f
File Path: C:\Windows\System32\d3d10warp.dll
MD5: 7e0fbebe0a960d5eb4516bd79d055e3e
SHA1: 686b250c192126c6c2d33517f15c27cca76e4de9
SHA256:6d35cf4c17afc7a2f4218cd30344fe40df95339b211cc483bef909a31c0ef192
File Path: C:\Windows\System32\d3d11.dll
MD5: 6af3a76e96995aa4c632258b49c03564
SHA1: 559c828de40edce3e6f526d66efda222a6df0bc5
SHA256:e5be216a442bb6902b4c0de526ce6052ead57600e811a830a82bc445b97adde1
File Path: C:\Windows\System32\d3d11_1sdklayers.dll
MD5: c119d77ef05f0f061f00f30af63ce6e2
SHA1: 8cc1ed71f424f657402156b7e81f700ba926c5ec
SHA256:2b0b1396c0f0c11489ef76b7e36aa94232343c3224bc1df057dafcd4cc2d5e3f
File Path: C:\Windows\System32\d3d11_2sdklayers.dll
MD5: 02c0b235e916fce803e439bff96a34ff
SHA1: a9f59896749bc525ad5fdc31b24f4fec1e52c474
SHA256:7933fb19f28e5aa1d62090c1b8faeebd737b17d3014f8965f02ae7521128f6bb
File Path: C:\Windows\System32\d3d11_3SDKLayers.dll
MD5: 7114095f7dd6cf3030e5e3298960efd6
SHA1: 9e5eb5b8368d7cb6f24c9d83b5147a4f0a1cfe3d
SHA256:e9420567a41a073d99377e69aeff85555c34b4f019d79abb2c6e8daec950e060
File Path: C:\Windows\System32\d3d11on12.dll
MD5: 2a10ce02b9bf1db28235a2d0b9ebb20e
SHA1: d117190cab6d91238c37d8abb1960a09950aad30
SHA256:29607c964f9581f81dcd290b203ccf9ff01096a2c9306f4f7926aa2be4ac0312
File Path: C:\Windows\System32\d3d11ref.dll
MD5: 28513cff528be0a5ff8c7ea811d04410
SHA1: d42b5beac232e0c81a74214db947b6fb9433400c
SHA256:a27bef911ff0f23d51aace43c2dde5e2b8ca3aeecdb45e35478b09a362980f59
File Path: C:\Windows\System32\d3d11sdklayers.dll
MD5: 445173636aa103c0d7a85b3c2832b171
SHA1: e1aa5770bcb7deb4370595998bbc0fd614cbd766
SHA256:47c15bb4fe9c2f7de967371fc432b40d3c30b09e2cee266ca60c46f81d5c27f9
File Path: C:\Windows\System32\d3d12SDKLayers.dll
MD5: a4a2a8fd47a931715509b04d3d7f245d
SHA1: 6e277811e9e19e892d3870569483802d27cb8367
SHA256:f094f28f3cf137fbc1748ce79117d5e2d0d49cbaaa5fbe097a02d0a89bd82848
File Path: C:\Windows\System32\d3d8thk.dll
MD5: 3c96d2cf6d93429633babe0d5c8e43ac
SHA1: ed39be3d4947b5fa31f80095ffdb59f6ae5d0d02
SHA256:80f29f97169e377c574db555be2ea435c091a9e3467a2fd83de6203823f74a75
File Path: C:\Windows\System32\d3d9.dll
MD5: 4c88b7787b17f8fad0d53076857c0e32
SHA1: 6f5e90f6f2b687135ce0cec2b7ec4f42e434f501
SHA256:134c078ad9ededbc6b26b9c49d20af69af2f948999e2d78565fa361cfb432c73
File Path: C:\Windows\System32\d3d9on12.dll
MD5: 2fd377f833c2e652fd972cc4b264a2fa
SHA1: a146f5ddb752719c42644e59aa6e7b3135c2cdc2
SHA256:31aa6c81764610c579c4b0633755c1b218cc7eee3548a631ca5e24766f2a6956
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvCamera\d3dcompiler_47_32.dll
MD5: 6b6566a54f80233135cae6c19d68056b
SHA1: be15f62bd73ab37b3c6d84e0543d02e669933487
SHA256:75f8943d4db56d6b384862b7e76aedcec2b563b00f035cd5ee0e0c4772048990
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NvCamera\d3dcompiler_47_64.dll
MD5: 2986a4820c7e31901d380c795eef1b0b
SHA1: c2437823c5e442e82547d1adc1e26582c7a09735
SHA256:54b861446ed388212aae9441f685b6f8a3437079e0621f7444bc231700af1f1c
File Path: C:\Windows\System32\d3dconfig.exe
MD5: 27bb4176ca94eb2a120d7a829e0b0655
SHA1: 8aad276a6989d7aff213c6bf4fc11abf8861d384
SHA256:253ac84f1eca414df429de75ceda6a5993c17e8c0701ad920fcaf2618f38cdb5
File Path: C:\Windows\System32\d3dref9.dll
MD5: a936257d7c0db5ddcf9f7ee8c294aec4
SHA1: 3dfcb58465e1513b190dc0c25c93b723ddae2406
SHA256:23b0443df12b995af75b1848ef7da56254a5a9259bef75a45cf125de84911d3f
File Path: C:\Windows\System32\d4d78066-e6db-44b7-b5cd-2eb82dce620c_HyperV-ComputeLegacy.dll
MD5: 3da13d5f9333657fd6457ad90721ccc3
SHA1: 4ce11e8fbb7f976929873b533a128d2927a8de19
SHA256:97f3309471dc08ac82dd0181c1c6d1cf9d580de1ce639ecd60e4455037ae0a79
File Path: C:\Windows\System32\dab.dll
MD5: 7cd0ae9a749163b1ac7c303b49271208
SHA1: 6331407233ab12087b5778ebd8f82f557050f1d4
SHA256:c186104ada2b99e3fca286f3b0ad4180b066c816d00ba283f003d66615a40229
File Path: C:\Windows\System32\dabapi.dll
MD5: e67ecdcf2021d4d72ba1f661cc22dfdb
SHA1: b5aa6d1f7dbaf77b5ed2edc32f94bdf7b8c82e7e
SHA256:d364f3941c1b3ea2a388c7823d68b9c44d37a737bf6d8d9fc7fa29c747799c37
File Path: C:\Windows\System32\dafAspInfraProvider.dll
MD5: 9c9cd6de70c51b5f2b94f7ca17a1b46e
SHA1: 1b387101d01e75ca9f331e78a94b152c7edc71a8
SHA256:66bf08ad9291fd1227707aa113226dc3d7ec7f7b4a412077be4ef16d540f86ce
File Path: C:\Windows\System32\dafBth.dll
MD5: f9c7cdd7edb19b792ff49fe4d18e84a0
SHA1: dd369af6834b97b12c341f082b89ca39573cf882
SHA256:cc7cafac727e65a0221f30ffb826bfae6eb64336b0cb9d6495e11ad4a9b72d01
File Path: C:\Windows\System32\dafDockingProvider.dll
MD5: 2dd1d1a83fac3a865314648e3be74130
SHA1: ddf9c205036c2f63cc616ebb5c26c44c757d18ef
SHA256:2caef86592c9fb8e425c86bc853204fe7dec52cbbd6390792c83b7dec12ecea1
File Path: C:\Windows\System32\dafWCN.dll
MD5: 126af12cbdc312c876268c64b1f65667
SHA1: 7541a8e31d4c241ae75cc0d988ab0237030e5280
SHA256:d737c55cbaa61523910d30c765c09e02d476d94746c068e3dccf348b59f012ed
File Path: C:\Windows\System32\dafWfdProvider.dll
MD5: 2ec6913b8f3446cf458b0f9441216ae3
SHA1: 5947df473eba7b95fa9a5f00535b03f54b048d23
SHA256:b93cf08ec27ffb3d790968e5191e7af8c5c2509165bb5eccbafd6c963faf7c46
File Path: C:\Windows\System32\migration\dafmigplugin.dll
MD5: 2ad2b7189e2bc77fb4c0089e10e8e51c
SHA1: 93b6740f63d0bd69f0a3cbcb04e43e597e5c7712
SHA256:2ab6796b460d03bba4e0f112bfb257a61d9b79832c06d1ff4844c96d687b9224
File Path: C:\Windows\System32\dafpos.dll
MD5: 9c63ed184211067bd13933094c7b8f48
SHA1: a10e90fb1f8636690e2c744a1addada950c951e5
SHA256:ef23a2dad3ab52378abf88dea3a466d54c37a18df279c2c90ead09a4fae49034
File Path: C:\Windows\System32\dafupnp.dll
MD5: e1d56dd392ff28c4a0eceab59f82f616
SHA1: 8c2d61301e682c83506caee0e83afba0a6f00d34
SHA256:8901c931cb6bc3a387b24148012a42d38af32f18565540ce9df7a35cf970dbb2
File Path: C:\Windows\System32\das.dll
MD5: 1b84205be3fa351a2cebc512741fe14f
SHA1: 3814d8d35e4b2df98933f012cb77f43bcdc13a33
SHA256:1860d1b7ae7ccd3e5dcc0c3bdd34af3b3c18b3bc47095ae62f3f3e19ee89531b
File Path: C:\Windows\System32\dasHost.exe
MD5: 1179f79ddf6d33a7191265a95a21eb68
SHA1: ef2a82608fa93c831f3e0672e666163655dbdfb9
SHA256:62070aebd1589521667d1db4a81ddebadfc0b4e7add091536abd08a7968ba605
File Path: C:\Windows\System32\dataclen.dll
MD5: 04a7ff26c72ed19ef0e45ca8d0773b41
SHA1: 41d3991fec509abe0a187ede9bc6675f3010a2b8
SHA256:1ac5a4d0bd9fda0e24ae34b72554abf9aa7c68cabb33d2a6f1325fe332c34dd3
File Path: C:\Windows\System32\datamarketsvc.dll
MD5: 239cdb675d63ea7cb85a63013e9c55e1
SHA1: be63445459354c20573117bc087d991fa1d6e1a4
SHA256:a70bfb1d56a3b9fce07a8455185b087c1a7b014b3c3e9e7e690d51693b280627
File Path: C:\Windows\System32\datusage.dll
MD5: 6d86b5d9f3dfda4b816ca6901f3a1c63
SHA1: f5cda52b1e90addaf3d1f162849fd69471b270b5
SHA256:9981da95fffc6e70d024d3849c794839686761475dd3ec1acb40c668fdd1f0b6
File Path: C:\Windows\System32\davclnt.dll
MD5: dc8f06532a4fd64ee4cbe3cd6d6d1bc0
SHA1: 61350febca930c0933ebe5d4d4ba6c63c9f6cee9
SHA256:710c6a468f06a8bb104a7c3f14fc4811f52d8b91d7f8b1adbd023bc7c79b833e
File Path: C:\Windows\System32\davhlpr.dll
MD5: 69a3d616728be663a91c8634c366c5fd
SHA1: 4c8ddca22f2d4bcd52efc231769485f246690ad9
SHA256:5257cbf1174ac0538add8547b125b65212ba958d61433ee6186545e3d2accc61
File Path: C:\Windows\System32\daxexec.dll
MD5: 10351c68f20208d9f2ebde755afb7413
SHA1: e3aa3a154e0a0714258ed5de8360d1228ec8958d
SHA256:366c1cde13881c09573678a0249173e64424b6cdd195a363adde194f0dfa3549
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\dbInstaller.exe
MD5: 40c132a692018919b3d69c7ab683f9a8
SHA1: cfe5f971eb30096889c9078e00706139ce4cfbf5
SHA256:d930a983a0ae574d1b4bc5a79bd5bc697d5351bd52b6b6c00dfc22532652033e
File Path: C:\Windows\System32\dbgcore.dll
MD5: f3420efea32fea5359f9a30aadb70084
SHA1: 19e9ffce2e99e3b43dc498e67b3360bcabd4f7ad
SHA256:9fd442ee31934edb69a2a923671025fcaf71e30891df01beddf3cdbd47e9e8e1
File Path: C:\Windows\System32\dbgeng.dll
MD5: b891e48a0f00856bc269e5e22e5dafc2
SHA1: 2c672b77c157e5e16e39f837f19bc4cf57464ab1
SHA256:33408b1f7f5c4325960040e2b643f444311d200add17bf4b7fc072a50f93f6f3
File Path: C:\Windows\System32\dbghelp.dll
MD5: b3a5e819e3cf9834a6b33c606fc50289
SHA1: e9c014796a74786beee522fe9689d1a255a1c59b
SHA256:38818f0389463e8d79cd50e21a79e9d232422080a120b905a4a6335125db7a63
File Path: C:\Windows\System32\dbnetlib.dll
MD5: b05e50a548afce1ef3ef61314b7c1257
SHA1: 4e588853c1e7f2e7e8c9c51429ad7d2c7c447e00
SHA256:ec21df8d2743688feee981b1e5e4a2b135fead77c8002ab094c041bdb40c594f
File Path: C:\Windows\System32\dbnmpntw.dll
MD5: 3df0a0464ddc3918c00aa96231fd0a85
SHA1: eac3e298811a21ff7c03175f8c6becde880c606f
SHA256:14f5bbad20afc5024a4d9d9d2249fa55d6b33571548b4b79d23ac8094e5d2d7a
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\dcap_quoteprov.dll
MD5: 0867ba95e0839dfd7f98a22e7a75e021
SHA1: bce832ed8da29d7b994e4349700f6e93ce541820
SHA256:1a17faa9d0399c866a19d9e1dc09dbc7b9f5536f0d9fa67131695f7779e1d8b5
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_d372a4ea3b959b1c\dcap_quoteprov.dll
MD5: 090638cb2c1be5d2f2e5e441c4f3dd5d
SHA1: 7e00a401374bdb11f7e11e4d55e0d819d8bd6759
SHA256:e75b1c23c535d59b5819ad4e13d144f11b90f8b4e9bf6be8dc4bf523caea3a2f
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\dcap_quoteprov.dll
MD5: bf8f5335276a78eaf5dbea741f3bc7be
SHA1: 0b596d4c82a7f8d0a30f72cac31323face85885b
SHA256:8c33a6043a2e23ef0e1ef8646e78f6c3df8bcd721b73b852531660a9b84223a7
File Path: C:\Windows\System32\dccw.exe
MD5: cb9374911bf5237179785c739a322c0f
SHA1: 3f4d3dd3d58c9f19dfbb414ded16969ebd9f74b9
SHA256:f7f3300b78148a34f6a35796c777a832b638b6d3193e11f4a37f45d4c6dfa845
File Path: C:\Windows\System32\dciman32.dll
MD5: fe824192bae253d3f573aefc2c4e867c
SHA1: e92cbbe2a2c53423f0927ab21da8cbbdfc39a705
SHA256:6136562386c033f3830c0200a43973a45a83269d944c2538c3e7d9704147c99c
File Path: C:\Windows\System32\dcntel.dll
MD5: f58b84fb79f52ca78e9c8944b5df9366
SHA1: 0b88d78b7c551ce66bf6973066f04c5d789a0d3b
SHA256:dc346c7e08e1458f62a63c9597208065626b2878de95447a4dd55a91658d7fce
File Path: C:\Windows\System32\dcomcnfg.exe
MD5: 43ba7e3425a24539dc6a2d63f0ed5c22
SHA1: e29601ff41df796d996a4a5d32e5e654b24d1e95
SHA256:2300cc68c414b779d20899f2acfbada8a5d9e7d01a291dd0df9898dd2cabb6bc
File Path: C:\Windows\System32\dcomp.dll
MD5: fbe2e968c9e58c186b2903748430ab48
SHA1: cd745c4713724661b72fbba0fceeabfce0e9344d
SHA256:f9dfc4ba02207bc838d3bf728e971838f191d509ea3153bebf1426a10dc56cc1
File Path: C:\Windows\System32\dcsvc.dll
MD5: a10aeb2bbe5dacfbec554eaa9e1fa182
SHA1: 9b6582f167be2fe1692ff04a64ca05eed6340e75
SHA256:7826fc03afac96722a008592987e576029c6296149728b71368b0cc673e6ccf3
File Path: C:\Windows\System32\ddisplay.dll
MD5: b1ad0056d131c4c9581b771783f78bec
SHA1: ff075fdd206cff81775c2f016f2aa44ba27b848e
SHA256:7a54b639cd75612e90cac4ba6b13d288c0fd113b2b52c92fea4017b65a9dc911
File Path: C:\Windows\System32\ddodiag.exe
MD5: 85feee634a6aee90f0108e26d3d9bc1f
SHA1: a7b1fa32fe7ed67bd51dea438f2f767e3fef0ca2
SHA256:99c63175504781e9278824d487da082da7c014e99f1024227af164986d3a27c6
File Path: C:\Windows\System32\ddp_ps.dll
MD5: 886b7d665f5753a982261e663a6285e8
SHA1: 1f1ba446dbfe9dc1478990c8599617d82f76fc76
SHA256:fd815fba4626a31bb32537b8d6eb101d1fd64c3ff7b119d8c0da3231bcea6878
File Path: C:\Windows\System32\ddpchunk.dll
MD5: a8ef967ac72be98d18b148e8182a188a
SHA1: c474e35260b5933ca3377f9d7a633836ff04536e
SHA256:a413d39f6d324889f36825e7a895113985234383bd334522d29eaf9584c59750
File Path: C:\Windows\System32\ddptrace.dll
MD5: 21db7395775331c225e1f963af910ff3
SHA1: ecd43ea9c3bc344db303d396b7bba01981f86c58
SHA256:799e3736f47654794de42dfd574fecf1bf1bb29ab08c13ccb018ab2ce2a2f014
File Path: C:\Windows\System32\ddputils.dll
MD5: 9093a43e83f74f9eaa22132fade6cefa
SHA1: 70deda9c6f03a37c395c4a8ecec1b42ce972c9f7
SHA256:5de244dd69cb8ff10147354ba3dd003b24cea2527c22b19260919348c9f1e84b
File Path: C:\Windows\System32\ddraw.dll
MD5: bccd74d0100f7efcf63b38c9fe3b0bcd
SHA1: 4becd8655bfa55be464c93c3e8f62176fecfdf73
SHA256:ef439977d794b91f1c96ddc4f5457a61baa1bee7cd9fdc5ce1e8d307a68c5afc
File Path: C:\Windows\System32\ddrawex.dll
MD5: fcd751e1022c2f42fe205cad66bb42c0
SHA1: cb4b20de4018e539dd41482255240fa87cef289a
SHA256:79f76763041f3441721aaa41f07316ab4bf577d0fa8b1172274b546b4bccd274
File Path: C:\Windows\System32\declaredconfiguration.dll
MD5: 22e252b79106e04f0b86ed9d52f1c4a2
SHA1: dad932811a1629e35fbd9e357a93704593745876
SHA256:f13d9d59c74eaac4f2f29416f78c8428edc470002ba25950853e86bd9efa9967
File Path: C:\Windows\System32\defragproxy.dll
MD5: 466bc43515832766f9b5c0cc9991f452
SHA1: 24d1ebb1df2a6120a0595610b55ae24e1eb43c42
SHA256:0a86ef1fa34855ebdfa8fec96549a1141a3e44f739822cb20e8f5bbdf68f92c1
File Path: C:\Windows\System32\defragres.dll
MD5: 1244f62d73218424028ac5374062fe4c
SHA1: a45b72ed09dc5a099080c93331e1653533d90910
SHA256:cef3da660f4656c1f17492820322dc1a7b87922f5a9f9d7e5d725ed87c71b5e0
File Path: C:\Windows\System32\defragsvc.dll
MD5: 7d789a2650a0bf055e4308732af6d8f4
SHA1: a6b71c7b594fe283d58bfe1183c4f1a5739c5879
SHA256:8940ee1c1e6e1efb4a7cc320bbb8482d4e606932dfae38f16489f9843930dfc6
File Path: C:\Windows\System32\delegatorprovider.dll
MD5: a1585ed3baa3c0e4ca0dd474dae5c7e4
SHA1: d150e893fd3e40e59a289d698c57fa1d8fa9958a
SHA256:1b56978da8148f6be0e5e1d2cb4abd5844090536139d60fdd1c62c52b5b798fd
File Path: C:\Windows\System32\deploymentcsphelper.exe
MD5: b924f1a7de5ed8331b3375a778b3fe38
SHA1: e62ce42735c05d2bb792af2648daefc04dea144c
SHA256:90e6dbdb4eb72ed9bcb4dcdc53f9a3ce3108297f84ce346b9af04790a641ccce
File Path: C:\Windows\System32\deploymentcsps.dll
MD5: 9fa590600b42531db1cf6c8ac4d2fac6
SHA1: dcb0be7d11be41af79a3f652768eefc2f3b37b76
SHA256:8ee6c8b492feec1dec96834e11976dc665a4fe7cb33451cb1b8bc413f033d3ad
File Path: C:\Windows\System32\deskadp.dll
MD5: a284c0667ca509d7323d7c88280b2331
SHA1: e358a7cd41f3693aa9454f8318d04fc6aab14894
SHA256:8b484b8bc5f35ddff15be07e2641c1e1ad0b4f2d82eb0a214db5cf206600709d
File Path: C:\Windows\System32\deskmon.dll
MD5: 4c9f652b510b10908e0254d4dd3e8b34
SHA1: 452dd18c47971ff1a78983fe6136f077514bc3ed
SHA256:dd074a4a483d09b8520b48362e488a2d8ebf1ab612ea0a37468f7116ef38f34a
File Path: C:\Windows\System32\desktopimgdownldr.exe
MD5: 1f4f892d968a1053b1529124e010438b
SHA1: 49734a44f294a362feb6daf24ded350ca01a1156
SHA256:7367ead88bc765cf3bac87f0849d339aed3110d32d913e08099f17f5f25a3ccd
File Path: C:\Windows\System32\devenum.dll
MD5: 9a5804b190c551f16cb55ecebd8d0b99
SHA1: f723967a940dcfddd7f95719fc27a4fec643d7fb
SHA256:6891f50bb4feb0bca4bf617c1174376ed2d153aa103741fb0abd46db313a656b
File Path: C:\Windows\System32\deviceaccess.dll
MD5: 79f8462b186b2ad1d2f5f11be6592689
SHA1: 8abf8235ce594055eb4f4949ea13270ba895f422
SHA256:79b2231b7ee0f59f4d1cbfc2eabca35770b851cfdd9cd6ab07430b03c7f2bfbc
File Path: C:\Windows\System32\deviceassociation.dll
MD5: 4401eba6cf54f61ff20357b632730d1d
SHA1: feb425c2ae2159128d2490aed06a2ce3bee5556f
SHA256:3acc60d00b19132df1bbb0dda7b4467c4e8a94625e12e598abeb8f3d159c431c
File Path: C:\Windows\System32\devicengccredprov.dll
MD5: 173f0ac709d06e9904f7d765418d8ecc
SHA1: 05a17a396ac4526d2521320b98d40baa7ad71a70
SHA256:273ee58e77f32470499a7a26dfad77a486fd7d300f4badf80036cd13abbf6871
File Path: C:\Windows\System32\deviceregistration.dll
MD5: 19948048d18894a00d57446f7271233b
SHA1: 0bce4c71ca6b05aca220e2d2a6d0ea1923b77a07
SHA256:0fdcfb59a7dcb1eebab7843bee74a527b99ef53af4cb550303282673ce34a821
File Path: C:\Windows\System32\devinv.dll
MD5: 386a8d5e03dda768b3cadeadd22e55a9
SHA1: d96bfcfe8a775d042c814b6036fcfe3169f29e5d
SHA256:d39ba20dfeb41d78c45d4549c68d7a0a82ab2e1a6b397601c3389b260273f70a
File Path: C:\Windows\System32\devmgr.dll
MD5: d5e0cc2d85f1ff775f12e6a76c98431d
SHA1: 2ecfa42da9c4b6cb0df7211e410262f2148ce5e8
SHA256:2c3066eb01533674e3d23f15a1082c77bca4168e4050d05aab9eb743b77646e8
File Path: C:\Windows\System32\devobj.dll
MD5: 2e8de473f0644339691ae7f25837894d
SHA1: df320f84011ec9147c0599638e4dca55bd0ecd16
SHA256:c40f777a52a8267e7c4e44b1c5a39ae01870f040a13504b043b80d72c173b3fd
File Path: C:\Windows\System32\devrtl.dll
MD5: 4b1e3f20a3644be34a2d9dd75c2e88bb
SHA1: 249be3f124eda7358c5344b9761a25b37b94dfb3
SHA256:bebae14b7307eacd151cda69469c6f32942f2b55825c42fa96a761fc43bc2c5f
File Path: C:\Windows\System32\dfdts.dll
MD5: 9e909d27f17231bd05946ef22bd3e18f
SHA1: 01d4496ad2eb31270635d58cc6c9aae1715bce5f
SHA256:aaf48536ff3f62d533fd60beb025c39ed54bd2ecdb5083310450a15fe1cbd268
File Path: C:\Windows\System32\dfrgui.exe
MD5: 571846bc9de120693290675b2b8f226b
SHA1: ef53408c2397e58766517fccf90ebd864b55da09
SHA256:3a5bc3ceda65e929d88829fbb67740807ac59d71fb3f242c72f142d8542b0d01
File Path: C:\Windows\System32\dfscli.dll
MD5: 549db9cb2e797ba2034655c82cfc6e65
SHA1: 39a5e440782ba905503d606d076d548ebe1f8f41
SHA256:ef1106fdc88a369ee2a2299a573f71bcd332576335667afe9bf5d5bba324372a
File Path: C:\Windows\System32\dfshim.dll
MD5: 81c1e6c20e9f78f80132299dd84e40fe
SHA1: b282f23bd6ff8f995c5887d664c33b1b5669d4ef
SHA256:5bd561a5e418e49c8fe365747afb6f41f172c24941f885d136a517f9b2f38fc1
File Path: C:\Windows\System32\dggpext.dll
MD5: 253412be6ea6f4b8311d04c2501be8ac
SHA1: f3b9cca81b563d11745623465a6584c2601c8f2e
SHA256:bd6234f2305f9a68ae73905d97675e351ea3689ac7b7b37bba2c950589286f84
File Path: C:\Windows\System32\dhcpcmonitor.dll
MD5: 3783eebcbb24d604bdaae9160df06558
SHA1: 1c6b9117aaa9a15a8c3afbfd5fc9bcc1a3413218
SHA256:eb9714b9fb2ce7428558c11b9f7d3d9476678c740445753f9e95f2a51bd58b5d
File Path: C:\Windows\System32\dhcpcore.dll
MD5: 242531c47669d2aa232ae8a4395d73f4
SHA1: 1a8c88b2b311540dfc9c1f1cff6a9a62940f726e
SHA256:ad09171a766901b6aaa9aed7a415c951063547422a0da47ddeb5761d74c19f99
File Path: C:\Windows\System32\dhcpcore6.dll
MD5: a5fa2c21b26d1c1976444df7c0b03ee2
SHA1: 6843d9c98854d0a6a4e0d96ec0328200b8fb79bc
SHA256:8ac334a72c2b04f8daf6e8bae0fd1df09d291918f79acaddc647a8352a1b9955
File Path: C:\Windows\System32\dhcpcsvc.dll
MD5: 574979bd3e8254bdf259fdbaefccfe73
SHA1: 281a7f65d9c4a165dfcab31f86376e966ff981b0
SHA256:aff701161faf234560448049199620f7db4ec262aa0132aa504cefb289d96d87
File Path: C:\Windows\System32\dhcpcsvc6.dll
MD5: e026ba82b2a697e496869eb16fbe09c1
SHA1: 9c2d169942b8968de28b45c7478794911ed36945
SHA256:177c5be020c643651ba871c6f7f60088fcf30988031f4c71ec32bd39a7ebf489
File Path: C:\Windows\System32\dhcpsapi.dll
MD5: 948b5da0a8f1c76442b495cad2360782
SHA1: d73feb8a71515c20272cfc7dbda7c49cc15483c7
SHA256:6c0d6f8eb5ea86c63a7056bfce4b5570ba87879849d96bbafb4c11f0d8437621
File Path: C:\Windows\System32\oobe\diagER.dll
MD5: 62eee6c31ea8dec308dd3652e3c99b01
SHA1: ca050146063afae8609c91ae1f727d7f94a61a65
SHA256:0244e7303a18a33151c978ecc225e4c4e458ef9fd1ca40cfc48d2e2283127efa
File Path: C:\Windows\System32\oobe\diagnostic.dll
MD5: c44b5c252d2494f57e1cd59970d46003
SHA1: ee306f2617e434deaf572805b8cf1eef81cbda70
SHA256:f8be949c5aee12b31ebb884f028b39405a4a7753fcceaeb88f54a2477a75c420
File Path: C:\Windows\System32\diagnosticdataquery.dll
MD5: 4331868677da4894e4bf971b7675aafd
SHA1: fde9cf772acfc0b9ad6c480f57a9158601c103e4
SHA256:54631ab414f46b8170ee221359b547abf3417d1efdd72de43c139f9ee9aef272
File Path: C:\Windows\System32\diagperf.dll
MD5: 5ff0169795a997fa612ea8b90c4f76ef
SHA1: 06f79d14239b84b1de1097d284f795643056275a
SHA256:28b828d75517b1633aa53c87fbb81c71cb52919efeea88134ac1ceac0f2abc38
File Path: C:\Windows\System32\diagtrack.dll
MD5: 67fb8e90f03f10a69308fe7ec2a21284
SHA1: ca87d6d057ff98610600d026a83dae3a55d212e5
SHA256:6e729a6a8960ead06f1ac99a2db06b84be1039e60a8ab6eb5ab8b266648638d6
File Path: C:\Windows\System32\dialclient.dll
MD5: e30e4e8a4adb5f275c079687e844793b
SHA1: 69df55f0c0c6a5a93626b015471273fcf804d08a
SHA256:42ead644eceb7546639c525001e10e2dd22e58ec6d0b49813bd5d3f60289fd5f
File Path: C:\Windows\System32\dialer.exe
MD5: b2626bdcf079c6516fc016ac5646df93
SHA1: 838268205bd97d62a31094d53643c356ea7848a6
SHA256:e3ac5e6196f3a98c1946d85c653866c318bb2a86dd865deffa7b52f665d699bb
File Path: C:\Windows\System32\dialserver.dll
MD5: 137436284f70223050abcc97b06bc983
SHA1: dc10f08a5415bcefdcfc95dc478a66928bbbf963
SHA256:2af3722020ffd87ff842168954300e7ed5224a547880d7fcaf3d17c20fea283c
File Path: C:\Windows\System32\difxapi.dll
MD5: 9c22edfa77cb9232fad1702c43fc77a6
SHA1: 8cd1c3fe31f1bdf79efd25bf9a9a1085ad3c5070
SHA256:bba549baebc8ae97c2fab770ed85be2c1537c9bb34dc78820c39728918a79797
File Path: C:\Windows\System32\dimsjob.dll
MD5: 4ffd43a733e4f0ec06dd32552cbe36a6
SHA1: 30027cfbe18e7e3a0de3ac6ea96260b7cbfe717a
SHA256:e14b46beb19687c0995d8edeff7b90f94c6545984451f827d853f72e597d6a6f
File Path: C:\Windows\System32\dimsroam.dll
MD5: c3cbaf824bf1a85a6eaa080758b1e2ee
SHA1: 22d07dfbc093a0dae6a5fa5c69c4d335ec456c69
SHA256:ca7a6efc56b2e9995e0e0366a427fe82dce24d51233d97b9baac724af802b415
File Path: C:\Windows\System32\dinput.dll
MD5: 50b80c4afef5c73b5f5e9c5cfca7973e
SHA1: f79b161816000851d2f3af87f30fba21bafcd2ed
SHA256:19ea7cd82a8c2dd72a51b26ebf62cb871e13dcb71ce0d84d84d617d0ea6694a8
File Path: C:\Windows\System32\dinput8.dll
MD5: 10e35060bd760918866840a18e90e1e6
SHA1: 08045c1be2c46e4e649f8de48a9fcd0b682c3024
SHA256:70c438b760ed306896f4d99b9a5f322e64fe000724729691a5673d59475dd431
File Path: C:\Windows\System32\directmanipulation.dll
MD5: cfa4f837a618d7b5c2f292eabfdc2e30
SHA1: 9f73fce6f5afbb1ff645de5a4099130caba105c6
SHA256:65e077814db88c6ae367c1d33e6cc2cfaf374957a686cb4529349d1745183ddd
File Path: C:\Windows\System32\directml.dll
MD5: 73c768dd706a39e46ffdac32f873d819
SHA1: cded495bb9827904d7708746e179c8e6197d2222
SHA256:de357f7b6718d36cdb730f214bab1d55a3ad6fe105838fd8ac1c0c45464e9c19
File Path: C:\Windows\System32\directxdatabaseupdater.exe
MD5: 1c5391dfeb57fd433caf5bfd03ca2225
SHA1: 6e581547093ce192041b41866172ce3cd1835c8c
SHA256:8795ce722463a51e9efb72184b627ddd23fa881a5d1c0daaca1540c9ccdf1311
File Path: C:\Windows\System32\discan.dll
MD5: 70370a020e3c163d7d1551162fac7ac6
SHA1: 51d75f39b64688f1b7a5cdfe4fea1104d399875e
SHA256:62a052e94539999bd7fe8de7885ab41b193ca5f4e7ac869533fad2631bc40ecc
File Path: C:\Windows\System32\diskpart.exe
MD5: 10a9693cfe404504890da7f7e2fded13
SHA1: 4380ca04eaaa8756e2f673eb82287a27d34ee802
SHA256:a103f691bf237961408ebae49412e888c0b39f7fcad210caa15e10bc0833205c
File Path: C:\Windows\System32\diskperf.exe
MD5: 71c63b97565da351d5e09b3c2f04abfb
SHA1: 3681e5bc71c84d3f4e2b9e237fb5dba27fd26a45
SHA256:73682f258351c8cb883a576539df703342e1828b19e7119e5a97e3352ef0d498
File Path: C:\Windows\System32\diskraid.exe
MD5: 9d2870d8eb59514e6d481252bb987b48
SHA1: 63f45da3308e130fb6a0c9b89c34182551dc6d71
SHA256:6f572bd4c5a0d9cdcaa2e63ff1b0e36982f4d35fa9fb9d360b2d8cc57fe4ee54
File Path: C:\Windows\System32\dispdiag.exe
MD5: d6087e386f3d6af9474efffa6c586cec
SHA1: faf1350a70457b82f5826fdb7b42a5b61252c41d
SHA256:89808fecda2b63d1a16c42748c4905324983f66aa20eaa704f39f251ccce7b7a
File Path: C:\Windows\System32\dispex.dll
MD5: 3660abae6992fdb6a9efdbfbd46e68fa
SHA1: 3bc5987ab44a307ad370a48fc445b1fb48824e95
SHA256:f70701d4dda4fcaaf094c3634ba919d0d462a69ad8b4a709efcca61488f8f3e5
File Path: C:\Windows\System32\djoin.exe
MD5: ebfe8ca9a94c0fab71b2b7439d7370a6
SHA1: c88c73b5fd57a19c14cfd98feb09b3c67d02a5c7
SHA256:34e111e98c51009746110ee9ba87dd0ceebb600828827af1cea6877a131dd6f4
File Path: C:\Windows\System32\dllhost.exe
MD5: dfe1e4b1b8714cbe1005ee9413c2bae9
SHA1: 660e47d00af463cdb615026565f06d9edb896fee
SHA256:0309834d40475ccd5a88c48f7ff5ec62e5c6798900357dd83665c3d0345124e0
File Path: C:\Windows\System32\dllhst3g.exe
MD5: e4208aca399ec8c0ad48b05960f7fa9d
SHA1: bc85dbad1a7bef476aa5d41bc9884515506c53a6
SHA256:360e11757029f102bf9defaf60b24f96a8c4b6726c0b9ec9ece4bbae89f3af7b
File Path: C:\Windows\System32\dlnashext.dll
MD5: 3aaa6ea7f75e89e9ca05898c9be5c1a5
SHA1: 3b7dbe62908f4f3788eb42724accc953e42912ca
SHA256:f46ad90060e9b50a52cc7cb210d3b193f0b108612bb63af8470eaa5dd5f75df6
File Path: C:\Windows\System32\dmcertinst.exe
MD5: d77882471250b42467876305cb459173
SHA1: 4eb99d2c44ba889d343d90becaaeb19e63a9b7ae
SHA256:c3266bdd6b69d9cd4aa254cdee3b00347de77c638ecc48ee58f3a1e72ed452f5
File Path: C:\Windows\System32\dmcfghost.exe
MD5: a245ee3f5e935b53d6cfe3491fdac745
SHA1: c9307ad21e9901d7a9c24edfcdc34bea83c09beb
SHA256:460d46fd4f0196d3483d5c3831017c931b8e34837cc873fb68c1d3239907f455
File Path: C:\Windows\System32\dmcfgutils.dll
MD5: 0c49f6a8b1332a87682e35342e37021f
SHA1: 23a8ff392d440a08c2bbb3839df34a560b23dcc0
SHA256:24eb6a549894d64639768bca81e569ea6609d9bc5306e3af477c1993b9169ac1
File Path: C:\Windows\System32\dmclient.exe
MD5: befcf11d72b7b67212ade85031dae055
SHA1: df7b157469bd1d324699bae03fc00d5bbe776260
SHA256:0a97928d02d03da2a9bd4e4896eacae2446fdf8b11db38153146cf04abfe95e8
File Path: C:\Windows\System32\dmcmnutils.dll
MD5: 4d74a1a0c6f5be6b18ca33944b4d9689
SHA1: ea5165feb755798a7e75ee00de6f48d1787cf500
SHA256:ddbee01854bda71b99591e91545af2d2389988b809c8be3eab49ef88cd91571a
File Path: C:\Windows\System32\dmcommandlineutils.dll
MD5: bb0eea6a880543bb964fad8754cc7a83
SHA1: db95e4316e69940f5d9fedbd7783f0cdf492b168
SHA256:4c4caa61ac32409a2a1ce995ada65417327dc9deffe23e651bca2e15b68b4c4d
File Path: C:\Windows\System32\dmcsps.dll
MD5: 52a43352e0472482e696da1bb89642df
SHA1: 59261383ece8ae8d6e4141656749b764b7c311b8
SHA256:77dcaa304f839f58ae57a375066baf1c18ad1924888a0c577bb542eeaf68b086
File Path: C:\Windows\System32\dmdlgs.dll
MD5: e099d3959120407e96f07c2de556c741
SHA1: ab4cfb40d7cfa24eefb92a9be633144ee46bad3c
SHA256:d177a1334cc1a7929b5f1db27466c773a1ed1f78e972d5739b00d0524d227340
File Path: C:\Windows\System32\dmdskmgr.dll
MD5: d1796f22a9a2406be67c2f6a7141b427
SHA1: 8628da05fd7c7a4ff70ef0cd8daa8473a333bd51
SHA256:4870263136d1f6a667871b605762d8a3cb3af8af0bec4b72d421e634eaebc041
File Path: C:\Windows\System32\dmdskres.dll
MD5: abd13543f3ca0d2d1bfdafcf550a21bf
SHA1: 239dffcb4dbd60fd64c6f160ce167471b34c1c21
SHA256:b38c7f6c1e3d4eb5b7d07de0ba10528fd3455655efe01101deed8de77b81fc99
File Path: C:\Windows\System32\dmdskres2.dll
MD5: 926a1c208563fde04e0de620ddcd416a
SHA1: 4459a5c370fdea9a0c01ff2912c14a9d006f14e3
SHA256:ea9c8b84d5d1ed617b107bbfae664c3fc32d33f6e5c8cd3aeee7006cea499ac1
File Path: C:\Windows\System32\dmenrollengine.dll
MD5: c4b8199c81508bd21947f38248ff421c
SHA1: f1ba7e3e7d97d6af69d1c285acfc9a764c51dcb9
SHA256:104411799bdcfb4f0729a36ee6b9b740ff0da63d1a79a5f97c8fb7b406355e6f
File Path: C:\Windows\System32\dmenterprisediagnostics.dll
MD5: c1e7e1d86dd9a75d802d485711547080
SHA1: 70880cf3436a9bbe1fcc6d852f36cb096534e905
SHA256:0e93898b390dc2b7e009c5be73f7d09f8b306ef4b2ecab9ffce94e3009c65093
File Path: C:\Windows\System32\dmintf.dll
MD5: 760e257240cf47145c45a78b6e73a3d3
SHA1: 12703a42623bfd81dfc122077411d3abf3f0c33e
SHA256:4c47d45871532bfbdb56598428ab4278f22e7bdd59b9dbf2e800dccbb109ce44
File Path: C:\Windows\System32\dmiso8601utils.dll
MD5: 897f309625b2ddd95ca4f2521ff49547
SHA1: 4e03ee8462473c422243fb849ae73f934e4cef5d
SHA256:8d7c595beb66a1fbb61dd6687f83d6bc2ea38d5d21801ec34c98dd98cfc3e8af
File Path: C:\Windows\System32\dmloader.dll
MD5: 1614497d7e05779ae03dafd0c0c10839
SHA1: 63ef6734b887c452d33ff5d75cb2ba6aa8da6d26
SHA256:eaae0bf13c2762a7c767b0b70fe0535218442097cb5c0876c8f34844597a939a
File Path: C:\Windows\System32\dmocx.dll
MD5: dba101f8bc2159c6cad739aa9fe9f632
SHA1: 02b40fc1394c2e0231e19cee97b2e8374d316e26
SHA256:36e88377ef22be090b232d4cc4c6277b9ee6f8c32dfd340da1a0ff1eb66d5aca
File Path: C:\Windows\System32\dmoleaututils.dll
MD5: e9b89bb069b2bb395d4bc1f412f6c2d0
SHA1: 6bfb44b84b123126707c8c6e7ec44460c37dbfd9
SHA256:17162df3abf3383b5862cae4e9a95ea036ad9f9700f09d6822ee8319d5b833fb
File Path: C:\Windows\System32\dmprocessxmlfiltered.dll
MD5: 31ae5369bb73a3632dcf96c0a393af43
SHA1: 98b863f43506e097e2b47a497e2aad36c84c12a7
SHA256:d67096ba6e99884258fd30e1c098b64610cb852ae21faa6774b66639d6f8fc19
File Path: C:\Windows\System32\dmpushproxy.dll
MD5: c65ca250da861f207a270cb2fc40d12a
SHA1: be9f7448f3cee3543eff12053b511829d3dda304
SHA256:b681dab43b8765d6fcb92b52bede9ba9b02a13c5f44fa6ca55749801509335ed
File Path: C:\Windows\System32\dmsynth.dll
MD5: 189aa133f3a1228b4fad246f1c399e87
SHA1: 731dbe9bb4146fea06f9f879a043f91bd7e6e560
SHA256:e85f57979c381e20c3898d37d0287dd7645dd9acdb6acc287061b1eb08f991f4
File Path: C:\Windows\System32\dmusic.dll
MD5: 17a587c782dfe228d778eb43b6cac0a4
SHA1: 0019445c724665565e2ebfd735ae6f1428d50995
SHA256:e07b78e1418cb221c88b33b10d760d5e020089dd7f268a700fc622de19441ea0
File Path: C:\Windows\System32\dmutil.dll
MD5: bd642028fe50bdb2af1e54e7355be9c6
SHA1: 6145f2733968207cfaa791abd3e11f1fc666c13f
SHA256:add78bb505dcdd9ce19efab9bd2e5470b5ad8253c924dbab62750654705b0721
File Path: C:\Windows\System32\dmvdsitf.dll
MD5: c83507eac4dabff8456266569ed385e6
SHA1: b517275e38831553c94ffc346b4b082fd3ef27b6
SHA256:5e569b8263361ed7069f7acf971f32c28353a6c684ba60113b00181f3a8b1469
File Path: C:\Windows\System32\dmwappushsvc.dll
MD5: e29a73e626c6449d3c7014faffd22a55
SHA1: ae91a5374f105654a2d4c9b10487684e12368c62
SHA256:50bc9fa3e3f87b46ebcc45e980bb153a934ff7f1737a6e0f4eaddb9164569c8b
File Path: C:\Windows\System32\dmwmicsp.dll
MD5: 1ea9b1d27b23955e8853b14a1b9128f4
SHA1: ca9297a06dbc3ebf262ed311203def22e0d219a1
SHA256:e4b4d500b0b14b659af73746eb307e3faa72a0544f321c8745c4ae5ecfc333cf
File Path: C:\Windows\System32\dmxmlhelputils.dll
MD5: 1fbad378ea21e92ef9398df2d6fc7ac4
SHA1: 281fe7c4d7c37b9378c9a1fd726b803eadb0dc01
SHA256:2fe26ecb04315c50b2b36fee15bdc9d261370a74f670d0034d724b806da6d1c6
File Path: C:\Windows\System32\dnsapi.dll
MD5: 7cd32f5cf65b86c38ddea8d86d2c71ca
SHA1: ea7f5309adf0dfd9d2af5c956f132dd9c6d0bfaf
SHA256:628e71c79e10bf8e613e8c83c07eef444a942ee726268c1c97d3965c3e787e9d
File Path: C:\Windows\System32\dnscacheugc.exe
MD5: db6c8a7f03eddd44e1b3f84d2f95b3cd
SHA1: 6f62faeba8fe19febdc0b8505c00a2218b17442c
SHA256:09e3ee5f14ef2944e350c8d2fa0bda00a9035f41af886f50ca15830d0be059a3
File Path: C:\Windows\System32\wbem\dnsclientcim.dll
MD5: b19e94b944bb06be96f9efc3abc0e6a4
SHA1: 4632a0b93f4fc3ced4a78f5719352febe2c26615
SHA256:ee05a7de454b561b51d063913e084252f5f8f02868392eb93b5d0f01a364fe1e
File Path: C:\Windows\System32\wbem\dnsclientpsprovider.dll
MD5: 28b1abfb1ec9590e38bbdb750c2bc719
SHA1: 2ee1a1c8ae201c8a13ae719492d5c8bf2f33b929
SHA256:cfd969c82c408d1cdbc0084736fd888d78c4a0e1dd5bb5873da9fe8bf0c35211
Description:
DNS Client MMC Snap-in DLL
File Path: C:\Windows\System32\dnscmmc.dll
MD5: 49ad8f86ec606d2a83247da8f8d8c80a
SHA1: 9eb72dd5681994dab659b4e3adf3ccc460b69789
SHA256:f777a484965e3840d74c98d4325fa8b064e897415be5f2fcfd1b8919e7a1fa56
File Path: C:\Windows\System32\dnsext.dll
MD5: d9971fa31a63fc60887d3158dcbe331d
SHA1: 4535bc16464e487c0db8c4501c54b8dbc7541848
SHA256:25faf7a94d600c21d9c8cd30cb2b880947837614e581f655205da5e45f680e64
File Path: C:\Windows\System32\dnshc.dll
MD5: dc9112afaa559ad10030336545d968f3
SHA1: f8572962e14012199dbc385c0a56ca84e6317ead
SHA256:d531b91d621999076fa80d06c387c08989d4094fd50f8ce4aa2f1f1b4ac53f96
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\DnsClient\dnslookup.dll
MD5: 5a9c34ff4b218d1c82d379f6dbc45229
SHA1: 68d85a9a04cf7e8cbf3caa15f19845ec11fc4eb5
SHA256:65f6b4e1dc98ba62bc8fc77891caffd4253d445884861f8b3b9c74e223498f23
File Path: C:\Windows\System32\dnsrslvr.dll
MD5: cfc1bb7ba33f404d5beee50dcebd8805
SHA1: f8091220dbe60e316c19775644a711558dda8e55
SHA256:31d028c32e9e14c143c29ef3c5bb868a84ab44d2fe5ff8304d63b2ea5b741c85
File Path: C:\Windows\System32\docprop.dll
MD5: 7ad0792d70b3e8a7c0c713ca80a5f539
SHA1: f134b408f08b3f0b057b77ae64e80f3b150fd27b
SHA256:6d70e4be30acc369e162480971460d8df4985ffccfebb15421c314b5b597bb91
File Path: C:\Windows\System32\domgmt.dll
MD5: f6237ee8a59ba4d102ba3fef767782b8
SHA1: 51b68f62e7cf5788a71fadf9daaaf2d1f3b22228
SHA256:7c949923e4a43f99e571b3e764ddac9f9e2764ad4cb88a3592e9283f90fbe1c6
File Path: C:\Windows\System32\dosettings.dll
MD5: 5876ec8ecf66b389a835ef53a83b9996
SHA1: a4b349c4a3fb59dec3177f6055c51c0d00fbf438
SHA256:7945c907da92690e010a2693dc5d4c55687d41cc122c48a355758b7b1f7e09b9
File Path: C:\Windows\System32\doskey.exe
MD5: eb0ba623c1ad0861f4f2d76c7b8e5ade
SHA1: 9edeee610ac26bbaba56f3c397fd48ca219eaedd
SHA256:238a87b25b6bff90dae703090cd3f07c1160decd307669df5e9185b9b09094bc
File Path: C:\Windows\System32\dosvc.dll
MD5: 7eb8f6de1d8bba77c59fb2697b22443a
SHA1: fe5866116391af4d342b7ad8c9a0e4218d2228fe
SHA256:dfaa2172c373f84156b7ba58e7ee50fc89536fb7e141a75dffc21fe647801c30
File Path: C:\Windows\System32\dot3api.dll
MD5: 75ee9f376bbad8d619f627165066c6f6
SHA1: 5746f6cf0eaac6f580fc0ab7e1fb498533153500
SHA256:311fea21f8bf5d96503ec1fb40f69f8207a7d8f17a1c734d60d5d2f382023fda
File Path: C:\Windows\System32\dot3cfg.dll
MD5: e80f3e2f24fdc17b72c8b804cf400a0f
SHA1: e7b65978f98e78fde3df3fccf9a1c93b7f3053a1
SHA256:3f15b75d16430c0e98033545cbdef66bebfa07be8b37ca979fd9f68b7fd9c88e
File Path: C:\Windows\System32\dot3dlg.dll
MD5: 1761b10f89124d316c118a0449f12295
SHA1: 727f1a2676e44a7e303b803271e5a85407f1b583
SHA256:c7e9402daa174345f7197f05b0c62c97fe0b51b59fd175bbb837493061a314fc
File Path: C:\Windows\System32\dot3gpclnt.dll
MD5: 3cce7e4f96d313f02a1d1a253784d179
SHA1: b279996dfdea6abb57604b68a76f420f7f91aa57
SHA256:4ccfbbd0b6cf13f393e2c5065cde6dd431c007390fe03783ad36fd4025e4b4ed
File Path: C:\Windows\System32\dot3gpui.dll
MD5: 9c473e9128b6c94856387e4ae4c31e94
SHA1: f8e4ee044f28a3d7b1c9b26a731addf9a1f722a1
SHA256:54d3c70135658f97e034d31818fee7eb23c06a0debc7888df9f4f4b9e6cdbbb4
File Path: C:\Windows\System32\dot3hc.dll
MD5: 54b47d5a014c278b0d6b4fbb4624d0db
SHA1: ae6d80943888f5b0448d94300f375317537b3d94
SHA256:f553bf66f628a633324a97faa41f98c95fdb95a72ac6ccb149f10b8210af0c74
File Path: C:\Windows\System32\dot3mm.dll
MD5: c6436e45b56c98962d5a3e75804c5d3e
SHA1: 16921311d6a1933e4e198b7f283bb565296c4b0e
SHA256:82436912be736011dbbfd5b4c26ff3da5b4a7eb78aae09f42f3934bf3f17b193
File Path: C:\Windows\System32\dot3msm.dll
MD5: 3950d90ebf400a06b63bb015f6d584f2
SHA1: 4251cdb50496f86a91cbd8245e3772df8b7b273f
SHA256:264c57c283e456e067c08538472e9b3b3c9e65fff709d59b257a9b951716befe
File Path: C:\Windows\System32\dot3svc.dll
MD5: 87c002ffc2ca15059a4955c2390f6e0c
SHA1: ee5352d5b2996862e8643a2e41af2c7f482a07fd
SHA256:5cbce610bd44e926c8cab09b29339206e57eb3d675ce263e84feaabb7975f1f1
File Path: C:\Windows\System32\dot3ui.dll
MD5: 1f1ba0aa36772e4e064c031b75e43f44
SHA1: 5b0408e854b6714768d68d48557dfe93025cedca
SHA256:c0177f3bb3cd3ae9c2fda8b63f89c48ddfe44a176fb1111f3943ffbbc6c848f9
File Path: C:\Windows\System32\dpapi.dll
MD5: 6e42f97bac5743c218fa0ef184785857
SHA1: 550c731b1798cd4db9fac373326ab89fcf2312bb
SHA256:555b16ffd205f9b78a473220f1702fdb9ae266a7929ebb92a4d170d82a755a4b
File Path: C:\Windows\System32\dpapimig.exe
MD5: b6d6477a0c90a81624c6a8548026b4d0
SHA1: e6eac6941d27f76bbd306c2938c0a962dbf1ced1
SHA256:a8147d08b82609c72d588a0a604cd3c1f2076befcc719d282c7cbd6525ae89eb
File Path: C:\Windows\System32\dpapiprovider.dll
MD5: dd47908da77ecf9c9627ba651e44c513
SHA1: 437efa1e2a38c33f592e15a01a83bb36db2390ec
SHA256:9e3fb6e6e377c8e85133d1b5a403645aea10d67907535dd76106311c23645db7
File Path: C:\Windows\System32\dpapisrv.dll
MD5: d54f94922044f775ed89ab34e3982e83
SHA1: cccb46c5cc01db91d2fb5a3207d9c2e94f9df4d5
SHA256:e5389793e2d9b6a3df5d1eae97b42fcab7aed20773be52f727ddd229f586a6b1
File Path: C:\Windows\System32\dpnaddr.dll
MD5: ba32bb24b7da23bd7ee7ae4b576338cd
SHA1: 17731367250361c6b1aaf24f988b8dd1150b1e92
SHA256:7cf4535e85ec02365c54bf460992344fe1e319381e794e51a7ce0f9cb0438929
File Path: C:\Windows\System32\dps.dll
MD5: 9e65c33cb7fb50453f7f4407070eaf53
SHA1: 83141e429e8560f6d9fe573837e39731e0c99a82
SHA256:a8707bd19d584daeca39990a2e791194140afca4fce31f23cc7e931df8c17361
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_4a3ae74cfa6c37d6\dptf_helper.exe
MD5: 3143f1c9ef957bba140b6ddd11181565
SHA1: 9af5f02a2ef3bff524b13bb558d24466917610ad
SHA256:3d04c84d37dfe0299bc122adc95b3c59717ab2e56a4b5c96650576983bf46d70
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\dptf_helper.exe
MD5: b910facebd410ad8aad2b17f89fb9c18
SHA1: b23cc71ef7d840a9c3446965e53020d04a548615
SHA256:c34f400b702ba010d9c1c0a5479300b03b4e2e3f71525f14d65ea35e800ea6c8
File Path: C:\Windows\System32\dpx.dll
MD5: e04efb4bc9eb92ed345c6376741eacba
SHA1: d22fa67b67b01c0a34b25f8ed49da3e2b02f6189
SHA256:fc14cc4f03d76766c9db66285ceeef39635fc490737e4f5a16eb4b33c2eec577
File Path: C:\Windows\System32\driverquery.exe
MD5: e9aaefb8346d15994d056dbddccbea15
SHA1: a498528978cb4755a648957ec72dda8c5adb289b
SHA256:6696bf1b9d15f90031dcdbf5f227c137ce9a85f5459bdc2d9b906d93b216e055
File Path: C:\Windows\System32\drprov.dll
MD5: 6728977df5eca28b6971d68d3683e578
SHA1: ea94e10054ab533de15eaeb1aa2b024ec7448a80
SHA256:95ecbfbf4161c22753334da4b859a2464dd73b952beedf89a71aaa25e415a5e0
File Path: C:\Windows\System32\drt.dll
MD5: b7d7bf1f22be9fdefbaf21a15032b0eb
SHA1: 857454355e5761192646af71551e668a27ea5bc8
SHA256:747fa9831ee2aeac65cf440ad17ec26edc5c078fb18b49c1ba0b8eac7e183d1a
File Path: C:\Windows\System32\drtprov.dll
MD5: 33968842617b5ebb66cebe7a60403f90
SHA1: 2b3bc4a788376b95fdeb61edba728c6b522f383e
SHA256:77790e70727612026064eb2cb8ab656763114f3ca566a0a307682434a265bc2d
File Path: C:\Windows\System32\drttransport.dll
MD5: e1525e5dfc035cf612439858abba4d03
SHA1: de087b5b4966fc869a866e1e7905586b8a0d9550
SHA256:08643784e8ede98969384d659373b0557276bf4eccabce3e8b700a0ea7135a7c
File Path: C:\Windows\System32\drvinst.exe
MD5: b07957145ca6fc160ac5de55ff73cece
SHA1: d29243803f6ec0ad4b53a34e1ec5a4753e338ad0
SHA256:499cb797907877dc79cf31dec62fc5b9704fc9a79f034ddc530f6a8b529afec7
File Path: C:\Windows\System32\drvsetup.dll
MD5: 1000e3cac90776bcfffb269383992954
SHA1: b4beb7371401a20aa16c8a6428bff397321c3dde
SHA256:bd635b345cfb5f7075200e17cffa1237a882cb1fd767e615c05d8de42136b50d
File Path: C:\Windows\System32\drvstore.dll
MD5: 39339a563235199f1da7f8289a748021
SHA1: 2c2b052af194040bed5fb8aae74245dde45ce26e
SHA256:0fd518ae16600ddadd6a2fb6954f3476891829c60411a7f9cb0b54bebff86ad3
File Path: C:\Windows\System32\dsauth.dll
MD5: c4be53a6c8f45c803ac33c76a6641ec8
SHA1: 159f5b1152a01159c3363f9171c11ea0c7ad5a43
SHA256:764ccd8639e1b078d708040c9e17ab4832c7d73d6807222073983cee51300a69
File Path: C:\Windows\System32\dsclient.dll
MD5: f503bab2b17e3391c1e09e0348e43ad2
SHA1: e563af6c67ea08e4c283858862bc85f5d32ec9dd
SHA256:65ceb1dacb2f1d8a8eda640175c9ceb95a18736ebe4d45362bdab2b6e8bcab41
File Path: C:\Windows\System32\dscproxy.dll
MD5: 082197d96accd95f47946e680c418975
SHA1: a180177938e6ba58187ad34381e626428f38426b
SHA256:f83649472c664a19e42d54cac27093e58a70242acd890023b7b1af1f5f7038d0
File Path: C:\Windows\System32\dsdmo.dll
MD5: 0cb1dc2ebc6a29eb4bb9751a4c34cd22
SHA1: 877cea60af6f97f2d4f0e02520f514f176b95e7e
SHA256:93f8667d45148539bc959a6c8a99b5988bdca1191f26dc0f154780b796466a85
File Path: C:\Windows\System32\dskquota.dll
MD5: 74b9d59203ad4ca8876fb00f33ffc580
SHA1: 5e9abc2ad7a6f6dc99bfbf1c26935b66a6a50e89
SHA256:1f83c05a9ef82ce590667edc2c6f91242e4ca1a34b62af33a769e881a1539e63
File Path: C:\Windows\System32\dskquoui.dll
MD5: 340366602da7b64c8e4bb0f93df821b2
SHA1: 675b7c3bb6407b7f93b81f7dff84674e63627981
SHA256:7a376f2ed39402d0214491ca3126d931b33a8ba5fb4b8388b03368080b2c7157
File Path: C:\Windows\System32\dsound.dll
MD5: f3578156a908dda6d00b0887c20743db
SHA1: dc4b24223d003764436f68e12759456309cbbd99
SHA256:65248c7a42e1a49aaaf4da58b118bea0205519071a4d8f1bb121fcae418e7a35
File Path: C:\Windows\System32\dsparse.dll
MD5: ae25d704719d867803a1b3e6cabdfa34
SHA1: 45681d8d7b602b92db267c7073fcaecaf996eb9a
SHA256:8bea2722604b77f0bef6496d7b22138765d486602dd5029bd78782a43d9bc9bf
File Path: C:\Windows\System32\dsprop.dll
MD5: 0db727f67fa8e1113b3b19435c54641a
SHA1: c76528bb737c77f783fbeb84b070917783cb802b
SHA256:3d3b50e15a9be91c9f71f2eddf25ee902bd0c7f658a01ca43f2c200c70aabc82
File Path: C:\Windows\System32\wbem\dsprov.dll
MD5: 4221bbd6922ff9c120f8487304d49ee0
SHA1: 6acaae4530984976ee1acc8b95c22a4a7420b99c
SHA256:be8c28c1487ead098a2b0744158b96b4fe9dcf20e431cb4d1c156557a4055ce6
File Path: C:\Windows\System32\dsquery.dll
MD5: 64da31a3f2d74a6c1f69e954b94d552a
SHA1: a2b2417d8bfacbd4a900960fa850ccbeb2359ea6
SHA256:b171978030d805467573c4dafc73f7afa2b4306b2b208760ec0603b3b803f753
File Path: C:\Windows\System32\dsreg.dll
MD5: b27a2bfcab2cfd6c8f13357a1ff3162a
SHA1: 29be50c3255c5be86d0564fe4f10d2a577ac5b61
SHA256:c153417f4e7fdc3e100b155d752cdf7c117a685796c1eb8839323926933ad52c
File Path: C:\Windows\System32\dsregcmd.exe
MD5: 7bef4790621fc01e8c0e00f423c5509e
SHA1: 1b5125d5c8b34d15d72cbdd74bacd84b00430bfd
SHA256:d0aeabb762b7080355be391d77d6dc3bf206bb1b413f6c0fdf2f22629fccd6b4
File Path: C:\Windows\System32\dsregtask.dll
MD5: d488b50981bc5e18af012b27c64e8f8d
SHA1: 51895bc077776e314fb840ab165d92fc79e53924
SHA256:4103ba925673cc50086f7646c045310dbab9e3712a93800d81dcb2348d324928
File Path: C:\Windows\System32\dsrole.dll
MD5: f4e116ac010f996f05dc4c6cd7bd66c9
SHA1: 7e45313ed70b14beebf15d59730c4844ca94e9f3
SHA256:6f38a08ee54b939266c2beca475769707e8c8a48adaf6a5a59c5d83437b6d2ed
File Path: C:\Windows\System32\dssec.dll
MD5: 6381caa08f9a4f78615207839c183b26
SHA1: d29965a55551fd5e40a659cd3c2c8b5d36be527d
SHA256:d7cce27536d737adb145935785d4be93ad5f44e83c69a1ed196c1f3027273236
File Path: C:\Windows\System32\dssenh.dll
MD5: d41d1ad98c90f8e6aef007fffa99c33d
SHA1: b45e76348df81290d880bfff3dfc0565c7c1b113
SHA256:946fc28d82f2512d9122e6f831a1e5e2796a1a0d260d2e87bdf8f039f26533c2
File Path: C:\Windows\System32\dssvc.dll
MD5: e68b6bcd11e153c565d797de5e923e33
SHA1: f5ec238db80c24e11912dcdcf72da60442bdd7a6
SHA256:dc5eacc0f4406b07efd5bfeb66eb5ef012f9f216cdce91b7698826fcdc9b57eb
File Path: C:\Windows\System32\dstokenclean.exe
MD5: 9cb602258d4432668d887c3f3c86eca3
SHA1: 35366b509d0ce281a2a9818b2b589b8ab2a0e532
SHA256:4e9e55ebe7190c55574c33652ad21d84ae702e83e024d7652773effbc1481a6e
File Path: C:\Windows\System32\dsuiext.dll
MD5: e65e1ca2e83fe19657ef691c25e953af
SHA1: 9d9aad5d051eede41d2f15fd8e36407d022421da
SHA256:466ed7f7eaae391c22a966b8563a3ec2bc6bd59fe4ebecb20d583333563f9a26
File Path: C:\Windows\System32\dswave.dll
MD5: 26b1ec4ce591813bce0e2dbf5d07be3f
SHA1: d70a2809e47e5fedf55b4e94ba56977050454074
SHA256:185f4f1fd965ee400f1af8fa09ee0d4101be807f233341432276219ce407db25
File Path: C:\Windows\System32\dtsh.dll
MD5: 9402468c026d4a45a052e488137446d7
SHA1: be569c554f407c15a5409f5ccd0ea004f818e078
SHA256:66afe8c3fd5a7778c9f2dee79346861102b265827c174affc8f3b1f1acc25963
File Path: C:\Windows\System32\dui70.dll
MD5: f4c04f60c264216a74148700245dfb8c
SHA1: c5f2e405773ec7dff00f70acaa41588ace39f1ec
SHA256:00b5dab46b3a0dd18c46b71d106ff2930ac1c48634856e0a4c741bbade3eb003
File Path: C:\Windows\System32\duser.dll
MD5: 7ce2d8d8b848d0882f7e7cf963a933ac
SHA1: 1d19599d9c96f8d9deae16bb50fccdc3092bb500
SHA256:12afc921ef64950e272cff3cd5ffe0d0667c4a1a47783b32a1cc15da91443fe3
File Path: C:\Windows\System32\dusmapi.dll
MD5: d37d523d33e306d57a138f98f6838acb
SHA1: fe38058d87c136fdfb50b6e0e438833cbd097abc
SHA256:1fe3c7b46a404f870cce1ee538bdfaf7fcd8adc3f09e6e386de1cc197d181560
File Path: C:\Windows\System32\dusmsvc.dll
MD5: 253b8abfe316138f80ce3a6c78a42a09
SHA1: 550e038483a2d0e242947cab716f0fcfbb717b08
SHA256:51e58e34d9792ca93d8ac59c326c447348c04ebedd50770974c4212f5c2c3b00
File Path: C:\Windows\System32\dusmtask.exe
MD5: 307158b41e0848327c38a914a12650b5
SHA1: 05437e5dfb72a3faa6659a820514efdbee8fdb06
SHA256:11d23c18d712837cf8cb52c4efb4f93abcaa554d8be508b447c16fd494c5c130
File Path: C:\Windows\System32\dvdplay.exe
MD5: b7ff9dee35818d7c2780d3897963d787
SHA1: e92da782d0b1b03e6484604d5a1518027e58cea2
SHA256:59576775d8a06038bd9975903418aebf003f075d82f1f109feaddab8877e3c20
File Path: C:\Windows\System32\dwm.exe
MD5: 544e0ae12bfd2609495fb7139b3d2b96
SHA1: cd73fa3dda44eddb04c250798bc2216360fea387
SHA256:de3d734f5cc52c9b58fedf1591c7f9ac28899e96d6834f73eccef9a156838756
File Path: C:\Windows\System32\dwmapi.dll
MD5: 39b67fbe291f86a57b236b4fcdd1bc9e
SHA1: e641f1ee5ad20e6324a3f6dca10b952ea265f751
SHA256:1ee52f8922705c77890e9c04f45f88d4bf3d9a9e365bf496ab86c3f2d565f7bd
File Path: C:\Windows\System32\dwmcore.dll
MD5: 0a451148e111af6f21cbabc5e22eee27
SHA1: 2d6a2783be50da7a8d3abb2a7a5701bbe493ebbc
SHA256:52fde710a4286e01411d0ec4623928442140f15cdca1985eaa2c3391b80fc58b
File Path: C:\Windows\System32\dwmghost.dll
MD5: 1c67e6430d2a9d27e9b2e12deba1d0a5
SHA1: 77b131cbeddf3baca5f3e2249536d30d5052dc78
SHA256:872d709c3954ae0f13034102f004915e1126bfe09664288976e07d492edde6dc
File Path: C:\Windows\System32\dwminit.dll
MD5: a69d51b45433829e59b0574754d6ab48
SHA1: 1e5ff43e8032b3406e20da71692a9b823ed67c70
SHA256:0a4d029d295c64a3b3b82e004f5737ac508497768352e5a82674460470bde047
File Path: C:\Windows\System32\dwmredir.dll
MD5: 712cd14fdce57b4258d0acfd4f9e92c0
SHA1: 8878360c6b964a93a538c62f4b0d54e26f2601fa
SHA256:71acb816328c95d878ff15c8591c862a89f1027feaa17d538b200d9f30c46e21
File Path: C:\Windows\System32\dwmscene.dll
MD5: bb2c8d318b449e6ede3d14c7b399233e
SHA1: c3bc8bfd97b43d446ef5e87484ee5d250254ac75
SHA256:68d302b3085bd5905049a58c34fab28a6c34068d204c210d89de3dd66f416bcd
File Path: C:\Windows\System32\dxdiag.exe
MD5: 19ab5ad061bf013ebd012d0682df37e5
SHA1: 12d398377984569695f4882c5734d5a7cfd727de
SHA256:b3c1048df7a2292798efcad66b3400c5c3c5747e8f09993621fd0de7b33a159c
File Path: C:\Windows\System32\dxdiagn.dll
MD5: a1f2ca31686253682abd0066a65a6178
SHA1: edb54d2cb2dfdb747d18a1fa698bae174e732d01
SHA256:a331beb9dd175c4f39c67a87e54faec4afc7e4cd98f437d8bcc0eba29810ef50
File Path: C:\Windows\System32\dxgi.dll
MD5: 2c2bdd1861252fa760f9cfecfa5738a8
SHA1: 03ed12255b7fed6124ba4a3320121271a780881c
SHA256:00dfc950fb3f259402dfab94b69534b8c455e68b8b254032d40e85aeb73517c2
File Path: C:\Windows\System32\dxgiadaptercache.exe
MD5: 793d8ad0b8b83877e776ffb098f58d5d
SHA1: 19741b649921bef42b6fafe648a356367486fccc
SHA256:c08990e20f213330a74b1a248412154ad0f83265a0e4f87a39247c21a2e6a7dc
File Path: C:\Windows\System32\dxgwdi.dll
MD5: a1951bbe803357f1ab1cb42bc6b1601d
SHA1: f34811c3181182c805bca5b811441f13efdc0481
SHA256:c5b18df1d78b79794b4e1c5bd8ee229836f7fa576ab7eb59258c4bc8e37914ad
File Path: C:\Windows\System32\dxilconv.dll
MD5: d962a6d5f88db0b8680e4b7f433c4160
SHA1: 60fdbe14063b3fa5062eb7d53ae2b405657eb94f
SHA256:4c00ef7890a706dcdc84804a1eff8cd69f029d549e68b3dfc8afe2da7bc43e3a
File Path: C:\Windows\System32\dxmasf.dll
MD5: 3f37c7014a0b1955831f8f018f7a7b62
SHA1: 4d1daab17864822757c35e3a586ecb3a0ee449fd
SHA256:469817b9ba251825b18f55a8464b31bc944a80772784d3727eec1715ac083f3c
File Path: C:\Windows\System32\dxpps.dll
MD5: 2cc571d6e1b5d6f17d9de2bd8c9c5bbb
SHA1: 5e67345c0ac27cd1dc346b67cc3e58426148f1eb
SHA256:615d967ca9a3aa09833cad8075dbf49586717cc0f612198ebd80b4fddda8d637
File Path: C:\Windows\System32\dxtmsft.dll
MD5: d6c4e7eda868a3b042a5a7d70e0939e3
SHA1: 1b05d9c279dd40417fd6541a88788d13b5e22269
SHA256:c617d7e0e375cb53fb5d72a2c4c07d308ca82d0f1457c9bc37caab1ef90024bd
File Path: C:\Windows\System32\dxtrans.dll
MD5: 547b86062dc90d0a739a838334d96e4a
SHA1: 84da696941b75b97e7d8f2e9f4bf75f1d113cefa
SHA256:551982fc886305a59eb968b34ccad1f641b3a6e1a3f17ef2a95c0136c82c936e
File Path: C:\Windows\System32\dxva2.dll
MD5: 7ce99f5905d6f3b7e768f23915aea986
SHA1: 4198596073ad198254bc88a46998cb2b7a774632
SHA256:5f61f0d9fbf7ec6b137b995cc9d1901d4c4c333877c619c5e6f56bac967cbb6e
File Path: C:\Windows\System32\dynamoapi.dll
MD5: 13dc19b9a9654c480fd9434556ce3a83
SHA1: d2fea642e227c431b448223d5bfdfd22a44bdbd4
SHA256:0406fe2c9aeb554b4da0e4f4b41917dcca905a1d0b3e2371330c42a171e19479
File Path: C:\Windows\System32\eShims.dll
MD5: 61070f0bd5ae9bd0f8456750de6976e2
SHA1: a65e381ee9d21fe3f3fd9191eb865fa5866dc87f
SHA256:5ff7034258b191d34eb5ee9dc095d45e37a21fab5341d5d4b376b2f827b8d866
File Path: C:\Windows\System32\eUICCsCSP.dll
MD5: c00fffc03c41a66ddfee552c597c1714
SHA1: 78b60b8ca93cf80d783488f028a8c77446148260
SHA256:6c66d94fb7e8f2b69a48fbbe556a91487cde9b60e92e91be8407f2cf2b8fc1b5
File Path: C:\Windows\System32\eapp3hst.dll
MD5: 4ed33b2e1e6b20f1bfc609715a653d1e
SHA1: 2e7ac0b25881e44a74cf801253aab57c7fdea694
SHA256:f0a8f8533255bd4c1f6657eaf4380c7b5f2b212b7ed4980a143c09767cfe6c15
File Path: C:\Windows\System32\eappcfg.dll
MD5: 738c571b90325dc03c584c9c3cde5bde
SHA1: 111cfbdb67c103de1dc4e0017ee97f996aa1e266
SHA256:19ca03ccf3ff2b9bfdf95cd2fadb91b35da3460ca59947fe8f2e568444e42716
File Path: C:\Windows\System32\eappcfgui.dll
MD5: d9a7eeb6e0efac2a0b56c18263ef5d55
SHA1: 69edd00d9b7f543f6c0151ff79bfa8c6fc2c2f96
SHA256:c9662313be8230b3269b52fa48a647c7b2c3d842d5db7314ca7d1b6e0d3a3083
File Path: C:\Windows\System32\eappgnui.dll
MD5: 6250b5500dbd9352d429f48118c63d65
SHA1: fce92fa9358bc24b3582bc2d1ed4ad57f911be69
SHA256:ea48c46595cc4b8d1202b1e6f14970ad321e2a19ce11da4651c3c1e2c9c3b4a4
File Path: C:\Windows\System32\eapphost.dll
MD5: 2a00efc904e77d6b433136494813b8a8
SHA1: 94447db37df4256304b2689d0520c6179dcbe031
SHA256:426c34195e631080212697352b8f6cded44f1b80e7df3fd81f020be9c75c83e2
File Path: C:\Windows\System32\eappprxy.dll
MD5: 8a4a767c6e8b851e951c4dc607c65fbc
SHA1: c63d15bdabd1f3c0bfa89316319b256c2cfe96c0
SHA256:650641e94af4ebd6675aa95becaa2aadad1b2c88f71dbdcc6f7441d17e992d79
File Path: C:\Windows\System32\eapprovp.dll
MD5: 74c4409f04ec4fe249e42cdf375d0064
SHA1: bdc4563a44b4eb80560acfaf376fe7c9f01db528
SHA256:9e6492263063e6dd3abbb310f7b3fe959b1dbe4183046b248eb4165f7b163da0
File Path: C:\Windows\System32\eapputil.dll
MD5: 462811f4a23d64c7bd612e17e7500e90
SHA1: c737be39bd260791551f1ac36bad6a7d7d6abcf8
SHA256:391c7614e8cd972e5866a06d65d83cc2eb8b0e7c744571ecfeb02449d8620dc9
File Path: C:\Windows\System32\eapsimextdesktop.dll
MD5: 98c6a75c3663bc36e2ce5e19f8b32eb4
SHA1: b327fce6c4d4d76373fcb86ef30a844357089baa
SHA256:49ed2f4a99eac9d838b29be8ed06311acf8e5ae5b1516a75da890d1a3aaf0009
File Path: C:\Windows\System32\eapsvc.dll
MD5: af7b5676a104f8a7d87dda84ddfd5240
SHA1: 51554895e41e476fa8c8bae182fc3b6b627017a8
SHA256:c89be2506c647924e94fa2f44aa4af9eaa2f794fa444c8854fea5b3f563ac185
File Path: C:\Windows\System32\easconsent.dll
MD5: fc55248b9aae5d5eacde628c055fbd1c
SHA1: 44196daf36885aa0f8478aab9b6700a2027e3631
SHA256:f181ef502f339a7326638d435c00cc2dceeb8bb632859104c0b172d6bd3921b0
File Path: C:\Windows\System32\easinvoker.exe
MD5: 82ef69ecabf12160625a6ba15d2a2671
SHA1: 5e590f68d63ba7ddf86c822498faa944a4e0990a
SHA256:4ab78dc788cead8f20227c9e2abfbefd5e74c64c85677c505ae7e694b7d41565
File Path: C:\Windows\System32\easinvoker.proxystub.dll
MD5: 91d0c976ceb395bfa6e6a06e556df030
SHA1: 1c0b954ba2bcf5230a6000acb746810f9df1ef71
SHA256:090fd5cc7e2c8955fa724b83bdcc7867ea106df63fc6e969361306acb2c6613e
File Path: C:\Windows\System32\easwrt.dll
MD5: 9883023c97710cfc83645b60e9fa4590
SHA1: e23585dc9fc394350cfe29d6f72c94f029aaf06a
SHA256:a2bccfd40795b9a7cc78720e6c9168cfc4d530195e5feffed3266228c9afe5e5
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\bundles\ecdsa_quote_service_bundle.dll
MD5: 6fc49ef8e0531454c8d8e415819be807
SHA1: c286f0c7787de2c444e34a8646c2c9a51647589e
SHA256:93bea5e8a12ead46a673650cf41fbe3c18aec83ed95efa3fad8e32504645446d
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_d372a4ea3b959b1c\bundles\ecdsa_quote_service_bundle.dll
MD5: be1a22cabe026474f5e313cb103a659d
SHA1: d28bdbf54ff2c6515c2e60f07619cafd84247807
SHA256:e57b0a103d741354a35cc58f2e56bc427bb57d9340fc09b984a4c553380ffd45
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\bundles\ecdsa_quote_service_bundle.dll
MD5: 6f2464481a3cc953eb577377faf43ad8
SHA1: a6fcb7d916a12ccf5daa4c4bee2b879cc7e537a0
SHA256:dbdfdd82fd2e1171a12c5c3fc3453e959d72893f16b301a35449fccd9bcd0dfe
File Path: C:\Windows\System32\edgeIso.dll
MD5: e3a10dddfe7ad227c34a9ae3c003a4d7
SHA1: 2c8d589e52549377b95c01b2556cade5b86b0786
SHA256:70fb66e8e3ab08d04486befcd366084b50393a6bb9b1bd0b9b52683bd8daca9b
File Path: C:\Windows\System32\edgeangle.dll
MD5: a8fe8e936605a55d9504e535a63e2aab
SHA1: 6498e62e3c1c4f85b1dbbb0c206cc444d7a70dea
SHA256:499755d506af675b91678c51f715b2fd37c0fdcc91aa1a9620d9eeef3fea0e04
File Path: C:\Windows\System32\edgehtml.dll
MD5: 8b6efad4d71f7c2285306bb9cdb4f12d
SHA1: f9e9ec4980f22e9e9bbc3b0aafc73d90e93e291a
SHA256:4a8236a7b26b1a430aa696161d02870970ff8b3386d7a7d66fb4a1aaac5612ae
File Path: C:\Windows\System32\edpauditapi.dll
MD5: 03494c22c5ffa81c05bb5516d4b27651
SHA1: 09c221e04b068f5b057ba50a66a81b77e6deb273
SHA256:e2e233071caa09d498fa3232d1bb28eedd7a41f8c83c7f4961f23b4c31fb9bde
File Path: C:\Windows\System32\edpcsp.dll
MD5: 70e8fd237111eea9e3211c77671b1071
SHA1: ce81e30e75db159b81eab0b3a2105ad2688b738c
SHA256:878de49b2254223e5e65ea37ed093df15d4cbad6d2430f6e25b89fbc2c0995dd
File Path: C:\Windows\System32\edpnotify.exe
MD5: dd858d34bf5fd23c1728280090aeff56
SHA1: caae96ab43805ec1c3f4ce639269b904972bb9c1
SHA256:84586d80400f2a46d5e2180f42bff3d543f048693b549d61e5e2363f2ca2d63f
File Path: C:\Windows\System32\edptask.dll
MD5: c9a3053418c3c1967013145f2d034a39
SHA1: 70cdb185eb8b0ef9d45348143b41f36dcb10e42a
SHA256:37b02171619309128578cbc708250d1049ed272af8c4fe8634652d6eee3d04e1
File Path: C:\Windows\System32\edputil.dll
MD5: 843f2c8bea531e03d2eb09923c4f153b
SHA1: 58ac2971c253e26caf85908b3dba1d9ad119ed2a
SHA256:5bd5ae579a5c96e3ae74f1bd4776e499aee00a0c75b607ff57aa42a4e46b053c
File Path: C:\Windows\System32\eeprov.dll
MD5: 8b2c6202764614c7c3d2e9f59e4016dd
SHA1: ee7d99e565b5e307aae78202800b893679e0c59a
SHA256:f2ed49f483cdf1023549e1ecefc2abece0be328f4bd415f5834b355ad063622e
File Path: C:\Windows\System32\eeutil.dll
MD5: 61aa3db620c7904a7471eeeca677f189
SHA1: bc65142f0616f249e68b86344fcda682d09dd65d
SHA256:cbe7664844036385747f22e6dc2931d37deb2560cbe42f49b8b12984be6e4fd4
File Path: C:\Windows\System32\efsadu.dll
MD5: d7098e9778095a9266294972e2cc5023
SHA1: 2bae2187df81522e31e9632f465a1629a5d7c890
SHA256:d42e0eab514b7d5749161bf549ce6d4e45ad6776303f8907f3eab3a49393757c
File Path: C:\Windows\System32\efscore.dll
MD5: cf5fca882157eb3259b1aadb052bd5bd
SHA1: fb5168096485a0e58e85429fb56a32811de635af
SHA256:48e7d31e0ca83fe93d7dfcffc4499ad074f848409341a53c7836a313fc96f7ad
File Path: C:\Windows\System32\efsext.dll
MD5: 284a6859eeba1d9594c1b0f6e6a81149
SHA1: f01748ad1f150b3f89a335b71b8643f9dd230f1f
SHA256:2e977dd8e42a135b4a5852443c375c5a2b2406b4855478fbd08d6fc70da72ce1
File Path: C:\Windows\System32\efslsaext.dll
MD5: 65744f22a1d8c00fa93a695accb695ba
SHA1: 1a41ab1791ebfc4e60e3128f8681c1377be1530e
SHA256:6d120e3717e764708882582556e5b37397e7e116e031ca1a7f3b5b9351bc1c37
File Path: C:\Windows\System32\efssvc.dll
MD5: e35df5b1085e53afa7689271c29b68b5
SHA1: e868a46f5e9f927f1d7d42cda968a6540e679cb0
SHA256:dbcf2209a1e0cabc54ab0323786a6454628502f32c5e80231ea25b9072d87086
File Path: C:\Windows\System32\efsui.exe
MD5: 64f5611cc62e65748d140e6f288ce1ea
SHA1: d337d3576ae4b7495f1d58926868af8bf296cf87
SHA256:ec1dc1a2ee200da0c787328df4fb91a2b978fd09ca1f83f3e55994c0f9ba1d11
File Path: C:\Windows\System32\efsutil.dll
MD5: 48541d7510ff0f6c1070fda3fa1d4393
SHA1: 8dc3658b56564311cab6314d751545e695545792
SHA256:897a2cdcef5ce938dfb2cee403768db0d8b0e465b88947b1ce53e6cc8f28dac7
File Path: C:\Windows\System32\efswrt.dll
MD5: 56186bfb57c198f5bf33797d4db5a3af
SHA1: b909eeb6414fc13b990516d164ee273d1783a6b3
SHA256:c6371199e4ffc724cd6dff276cab4cc57bd0099fd2bf2e1348bf817aa8c28bcb
File Path: C:\Windows\System32\els.dll
MD5: c785ee2338aa1aea192df78c3a3b3c78
SHA1: 9538d4abe2469e94bfc895e76b70dd7bc00a3eb9
SHA256:a274f7ea59b7e448b0f9139256a0a9e3c5e7ebe52663079f37ad7ede862b33da
File Path: C:\Windows\System32\elsTrans.dll
MD5: 96ff64b06d4fc5dc2e185010656713e2
SHA1: dcc7edb8f1a8f62aa8db962e849093ec7d642ce0
SHA256:7383a08223ad5ce1e9360dc671858067c121fc3cb4be8f6ac340d9a07f395446
File Path: C:\Windows\System32\elshyph.dll
MD5: b7419ed98748ae852cdc03d0921f8376
SHA1: 245a9d035b95f06f462cd92e28e638dbd15e7624
SHA256:854bd57bded16e9e6f170cf276005d32d497e6cb952a51b4dddd8ec5bb1822ac
File Path: C:\Windows\System32\elslad.dll
MD5: 13582346438411fb4d1489d42e899218
SHA1: 281a06cf3991b651a2b6da25f5adc56fae2a8f72
SHA256:4592ab9bc6bc0a6fa96f2dd86bb5c4ce5d37a2570665aa6d5baa941d9d098afa
File Path: C:\Windows\System32\embeddedmodesvc.dll
MD5: 17ef443436b7a4fb20beae59647bf350
SHA1: 9d1d2a52d4f4671a47200aabe6fc0a03199c244d
SHA256:7e955e7e2155af67f2acac8844fe58680ba4d399b36ab3addf6f59d1659d2148
File Path: C:\Windows\System32\embeddedmodesvcapi.dll
MD5: 13af9d9fe49fef7b53fb0be4c9a0f25b
SHA1: fe62c1cdff3300dfeae4b7b72728c170fe3ed28c
SHA256:dc50f472a347e1748558eb9a3605285502f39b8853c4ff62c11b79521ff8ce32
File Path: C:\Windows\System32\encapi.dll
MD5: 67e009782032556cb2de6ab2ae173916
SHA1: 252d5530f0f118dd01eccfe06b993f73aef67ff2
SHA256:3f493c22dbc34a1c1de4efb99642d55975fe982bbd5f1ba79cb1a02f9d588a62
File Path: C:\Windows\System32\energy.dll
MD5: 8e357dd7f126a259659df25088f00b50
SHA1: 3e0d6f1ee47cdf8947170db4d3ab76ec84a24be0
SHA256:378f20ccdfb59bc42ede7605c9ee4826dd01576ab1a07b87effa080f3e657bc2
File Path: C:\Windows\System32\energyprov.dll
MD5: 021357e28c496ed6219667184684ee00
SHA1: a51ddce6ef58fd792dcd531799c47a4bc21f0624
SHA256:29506d3a8899a017fd1505156862a81a7608032a23a8f311f50e5432e35f2682
File Path: C:\Windows\System32\energytask.dll
MD5: 796aae2dd66ceba3507fbed363efd0f2
SHA1: bebcc4d9615b18e9ee2450ae98169be8ec118bc4
SHA256:94f850e2d0478c32d1574b0cbbbfaa5d58bb8b289d8b5bf0ee74e4086ef6e3c0
File Path: C:\Windows\System32\enrollmentapi.dll
MD5: 5f0fb9c6d211621267423a0a92911d81
SHA1: 1557d7a56d2e4e9b48610bbbc9c95c02fe9f10b0
SHA256:15b6d52aab3adca99c63690f5ab98ab959b344968bb8c60aca6b6be6a6c2b652
File Path: C:\Windows\System32\enterprisecsps.dll
MD5: bdfd0b77dc5a59f26a332a976488f8b3
SHA1: 52c5e5c6489a0fd319a3f1db2c0cccca87c17731
SHA256:ea6150c42f5002c01428996485763ae8f68e8c508ae18e2615e357e71dd9e633
File Path: C:\Windows\System32\enterpriseetw.dll
MD5: 424ff4450d34cccbec29b6889a4ef0f2
SHA1: 7acf47853e15fc13d1ebe5b1ffa5db3e7bf83d72
SHA256:97d9516dbb3d0f7af975e39d6d61911900c87c72a1b24384c10189328c7b328c
File Path: C:\Windows\System32\enterpriseresourcemanager.dll
MD5: cb9a909bf9eb90c096fb5543254681ba
SHA1: 29334737d2942f32f99ce1d9934a69b3cf8378cc
SHA256:5751c3d68db38980241bed5b8ee3483cdc3a0a56ca259ef22e168508ee1f9a23
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\bundles\epid_quote_service_bundle.dll
MD5: 1446cf2b7a47f7ae2e0860099d3387d4
SHA1: a393018f23fc685189972a7218533b757471b184
SHA256:ccd764db135989f6b43869d2428e4c7305c90f196144f4b680b458fc04ce9757
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_d372a4ea3b959b1c\bundles\epid_quote_service_bundle.dll
MD5: 6f9720d53acc74e579fa90292094f623
SHA1: ac73c86165863e4a3895c562ff5f15c3319d0e0d
SHA256:8f5f6d9fb5ff8d56c60fb249f4dcd3fa39d94b774b7b177d5e1f9c3ae97a0a92
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\bundles\epid_quote_service_bundle.dll
MD5: 940ca7a61ae8a3ca66900a9f81701dd9
SHA1: 5eedc2944c03fd30e431eab71ecf4d9d06142cea
SHA256:99dee27e9593b97dc28a7feddc123acd0df60285a7cbf13d3d0f078da35ab9dc
File Path: C:\Windows\System32\eqossnap.dll
MD5: 32ded17badb11cc20745a60bbd4bfb52
SHA1: e5aace0767bdb5fcde22fb51584cf0c0c14ccee9
SHA256:dac8b525f87edd5f7831ccf7bd77255d67952bf01c7db80ff78886bc90d83607
File Path: C:\Windows\System32\es.dll
MD5: dd65044d7bef8782bc4c6fe9d711d453
SHA1: 59331f9dc524d901644aec03a21da73c239e432c
SHA256:69d13f4c689f738faebe4694b9ee6fc9f05cae745140facac08ffdfd89e1bd70
File Path: C:\Windows\System32\esent.dll
MD5: c22750c0e36e2cc6d6829d01d0982c7a
SHA1: 2b9abc03fdb58745724924ab05d4ade3d63b74db
SHA256:4cd7d6897967a943b5e094cc5b2ae9372a656302c6f2feb110c525838d598552
File Path: C:\Windows\System32\esentprf.dll
MD5: 4ca2d7667f013993a1eb42b7f205e172
SHA1: 3b19517062b2cf4ebad572d38dca33fa37fe0636
SHA256:08b51d79b731157643fa12f7b35fab068ddbced117eafe5d037c5f110dbad894
File Path: C:\Windows\System32\esentutl.exe
MD5: e2098b56cf093e165d030e27591ce498
SHA1: c1c23e7ef3e0c428ad776a25fa556c776078997d
SHA256:753feb8e2bc07b6ed0e3ba836a33ec3c6f097a237fb9d48c23938892c8a16f4a
File Path: C:\Windows\System32\esevss.dll
MD5: 7e40924d76f0b0f505a436fc692fc129
SHA1: 5b5d1292f8af7601a4b62a26eedbd58347ffbcc0
SHA256:a90c0f62e325efabc4c6cb5df54686c12c6eb2f29479047299c1564a140f314a
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_4a3ae74cfa6c37d6\esif_cmp.dll
MD5: 9b8ed1468a90bc652c61fa6778d2ccab
SHA1: 46297aa22685d3b4f5348a2595ff2da827d6859a
SHA256:08a5fd181d9d91539c3f73323f018cdd6a3bcda34a5bc5ad83a59ed29cdfd252
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\esif_cmp.dll
MD5: 08ac085ffa5afb5471aa1d07be4344df
SHA1: dc776871c0b21284f5d066186934dcfe255afe5e
SHA256:ea61a8ac0e90979f69cf692e7545ca504080aa80ac06ef0f94163d7fa3e573b4
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_4a3ae74cfa6c37d6\esif_uf.exe
MD5: 3edb6be675f6352104c1d7a53b267524
SHA1: e5224239ba4f852409c714d48b26179314323667
SHA256:7a895950e4f09c76648297dbfb791bcd55e5c003eefe874f8198e44b894222d2
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\esif_uf.exe
MD5: b9370f000daa00b45f6e8e147c8d2a2d
SHA1: f2f0e835a917deff2eab485b822c4f53a4665c31
SHA256:faec42f50c64b830e78bcc35c2a4b1592f043d368a6cc8d71edda3694f002299
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_4a3ae74cfa6c37d6\esif_umdf2.dll
MD5: 2a7e3b98962c369b1ba73e4314ba2290
SHA1: 8d8f6bbb387e7c13f36407f31c3455aa95bef5d4
SHA256:b42838a6cc38d72ec1d46ca36f8bbe099c5e232d41ed95bb42c30d53b53ba098
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\esif_umdf2.dll
MD5: ffd1ec3f87396aa538462d747afef828
SHA1: 2133abb55ab4338d8e05669cd942eb5c2a0b658b
SHA256:8a086400b843293e2cb89471e8fd439d5907281666822175f69384e792b06617
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_4a3ae74cfa6c37d6\esif_ws.dll
MD5: f64bc01144c423887c7c6196d2b53689
SHA1: 6bc9cc8011f37b374c89ec6faefcaafa760e14be
SHA256:b116f60fff89a7505683ec46665f94bba2e281d9a2804b2aac7b8395781ce120
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\esif_ws.dll
MD5: 795a968806e77e8e06a8ee7c4c0ec896
SHA1: d923e9a25e3a0c07bf3af97f82532d0617ee7911
SHA256:d34123867f112e7a481409ff53165d6c382b14e7473ac5e25794e5d64edcf06a
File Path: C:\Windows\System32\wbem\esscli.dll
MD5: 1b9df7e37a94b5c619b58e958f9ae5e9
SHA1: b5e2b043761ac04eadc9ace13af52b4d7cf071ac
SHA256:05808307d206ce1c2f8edcf14d619c8ff4dc8b8237feeb7579436998af4ad017
File Path: C:\Windows\System32\eudcedit.exe
MD5: 1b29359e3657223fed34f6c7559543d4
SHA1: 24dae844d9200c6b234a761c67266825a88263f6
SHA256:c2ee0b7f1009ae449ee5cb91659c17bd711335c53edc31fef609c26cea63d7d0
File Path: C:\Windows\System32\eventcls.dll
MD5: 974371aa576d8efa814c150853a942b6
SHA1: 462f064d976699ea50db629b8efdb5870bb40def
SHA256:a5c5154e575b6b31278f948813148f60d384fe11ad36c593a840d8116048d377
File Path: C:\Windows\System32\eventcreate.exe
MD5: 091ffa3893661c5597ca719f28ee03ea
SHA1: c80d0792ecfca2113958c0a8805d3d99fdf58a76
SHA256:7cc501292377dc849a34214f017f62a7331f44f96bc6fe3e566253a9918bf811
File Path: C:\Windows\System32\eventvwr.exe
MD5: 3a8ebeb41000296d44eddf39a505f7e0
SHA1: c426a1490e469025f20f51939f157dc15e4d6ac3
SHA256:be0d401c8b42024b0918394faa0aa6b494ea537b3c6c2c62c3d9064929f6245b
File Path: C:\Windows\System32\evr.dll
MD5: cd7f76ac0bfb8a4fa275796d9c6452e2
SHA1: ddf81160c73be656c2c356ddd8570f5add039cca
SHA256:49c43e0bf82f75556a72c6272354940719f8a1b68d1c9bcd0b1868af5b71a942
File Path: C:\Windows\System32\execmodelproxy.dll
MD5: 3ce6c5abadceee8399817c0bb273acf4
SHA1: 061cb1908ba194f019b0f12bfa18b326153262d5
SHA256:b5f658d1beeade108d9e73ad0b26e8e9087eff730ae873646fda4acfdd3ec3d5
File Path: C:\Windows\System32\expand.exe
MD5: 3080ad9250254478269b486ec15c25ff
SHA1: 56f145b564eee207a542c142ff9c2fe56a131985
SHA256:210a43646b58a60035cedc30281f3414dd6a551a62255aac7ef828c5d7ea46ce
File Path: C:\Windows\System32\extrac32.exe
MD5: 41330d97bf17d07cd4308264f3032547
SHA1: 0fcd5a3233316939129e6fcf4323e925e8406e5d
SHA256:a224559fd6621066347a5ba8f4aeeceea8a0a7a881a71bd36de69aceb52e9df7
File Path: C:\Windows\System32\f3ahvoas.dll
MD5: e5b2ed9190cfb6746b66d87a523a10bf
SHA1: f9257d17d3d0a4fd88dc005ec0bb3e25e2eacd26
SHA256:ad6f0f7da54a0a99c4562884bf01c8dcb68e612d71e745d4f852f89114f503f6
File Path: C:\Windows\System32\f989b52d-f928-44a3-9bf1-bf0c1da6a0d6_HyperV-DeviceVirtualization.dll
MD5: cf31fbe8ed6cb60c46f19f1c4d765a66
SHA1: b8fc28b77e4cf5e26b342883ac5fe39a15b61f5f
SHA256:34caf94b9846292f37b9667200546334a81051e25d97dc8e2ee7e9e09522d051
File Path: C:\Windows\System32\facecredentialprovider.dll
MD5: 0aace46e30db01e997921eb354be760a
SHA1: ebc267e14ecd613a7fa04a73d5e5ce1df945914c
SHA256:13d49d2037711296fff71d3e634fd35bbde9a077cc32d8f253e6a13abc7f1030
File Path: C:\Windows\System32\wbem\fastprox.dll
MD5: 0845a1b3270f360fa92dfcbba9b4acdb
SHA1: 223805ce9235d7233c372820ff333b24bfe0edc1
SHA256:6a9aa2e1d3b318a33258cb0a78f16143e4903ece9b1bb1341327034c8af1ae22
File Path: C:\Windows\System32\fc.exe
MD5: 1c20087f983d01465fea3a33eab19370
SHA1: 6e2061e02ef3c747046d269c55c2e78c4cbcbdc2
SHA256:c5b2fff1230c5cb4b7e62df2abdf65df25822e70d68d27a9a390016a3c3d5c04
File Path: C:\Windows\System32\fclip.exe
MD5: ff33ecf69a742e472d3cc18d50ac5550
SHA1: b1625ecf4c5b755c5b9ff1343db4457182cd9af9
SHA256:acd8d2a93e3e219201c39d79a8b54ed741c5fbd99e826ed6d5a9df6a382ae905
File Path: C:\Windows\System32\fcon.dll
MD5: 34c535edeee5eed8526b8ce36624924b
SHA1: 956837dc672df592cd3acbe088a62c0dc565739e
SHA256:4807231eb31277d2c0c51abbf0b2cef39cd20a8d2368783d88ae4acd3992cdef
File Path: C:\Windows\System32\fdBth.dll
MD5: 43d344fab9abc7eb9a801f9a60e7f935
SHA1: a179b594cc1932a196b3a9acffe5056debe0f332
SHA256:a6b4afc7326a9812786be19afa51a91892a70147a646e19fe34201692cf13e93
File Path: C:\Windows\System32\fdBthProxy.dll
MD5: af3acd533f8f037306a2c8a15de7261c
SHA1: 73a74e96e24fe1925303e1a9988dcd621f2e0252
SHA256:3a69948f2f3400e1fff4c1a1eae9f0c96cc0970a5b69b3219c2ef4ed37716907
File Path: C:\Windows\System32\fdPHost.dll
MD5: 0439b82f6034ada3e71c0c9f169082bd
SHA1: 2e06272a907115fb37f834c0d07e8bbd089b9c4c
SHA256:0918728669077235b2f2db7ee22ce819fa570d8a7a497ba5f11e76774ea75099
File Path: C:\Windows\System32\fdPnp.dll
MD5: 34451967b57cad45aaa22ab255abdb15
SHA1: a7cb20aeb0e9dcfe797ff96d505f568d73c3cb9a
SHA256:7498d2b873a2333be2876ce7b2be1c5e8961ece30bfa89a00bacb2b1e7d69fec
File Path: C:\Windows\System32\fdProxy.dll
MD5: 82b23aaf9669747fdb33b5a3a3b182d6
SHA1: 5e789a9905b2db8249ddc46b5314a60b278d93d2
SHA256:375a7ca223d453e171ab8665911050271d255eec9837f9b41f28640eddfc3a95
File Path: C:\Windows\System32\fdSSDP.dll
MD5: e60c2fd66da3862e0fabbc2321c0e171
SHA1: c1a61bc5e6ac02a18ddc01186c20ea057635db07
SHA256:69b2d4d9833d290fd60a87d064d3db5ada7a8bee2a8fab334189ce8cf657ab32
File Path: C:\Windows\System32\fdWCN.dll
MD5: 4d637fdd49acae94b2b6dbee98b19433
SHA1: 3ea8d3760bd5e6e4a797cb3d8ec6df51cf39dc9e
SHA256:4f07be4945da7cda89aa6d9bd5f475073b9beff980b9953f39b77ca089eb621c
File Path: C:\Windows\System32\fdWNet.dll
MD5: 662412e5e861134d25276055e6446db4
SHA1: c4878b3de1b03596d77131437f37d6bce163ed5f
SHA256:55b099f23dbd852227d42db2e18bdb383565820f6751f88f350f41f7402a6264
File Path: C:\Windows\System32\fdWSD.dll
MD5: 3ef7b50916c1e866641b0222955d836d
SHA1: 56ea1aec578fb378ce716eaec77103d3d700177c
SHA256:da5c8f034c87232ccac30679e735e4073f78bb230808281ac4c84b3f9f0e2b40
File Path: C:\Windows\System32\fde.dll
MD5: 154d45b21871505816ee9ef61554d89e
SHA1: 7a850c1cbda8ef6bedf665197c7981be67e31d36
SHA256:669e714de6ee9e3bd2c40ec20f59095441a90b7aef4f6414009dec4962cf0cf8
File Path: C:\Windows\System32\fdeploy.dll
MD5: f6a1adaa2a72b83468d4aeb8f910dc66
SHA1: b147e1c0cb8672cb3513fc44cd3d41ae86b145c7
SHA256:7bda581cee66e68c503ac00187f37730b3deca17583f68d0e99e14f7ab953f53
File Path: C:\Windows\System32\fdprint.dll
MD5: 8f9c91fb48fb94bad1c22d7ef241c9ae
SHA1: 14898a3e97f78143052428a7b62b92510a47a09b
SHA256:2443a36b73e2a58bd62b9d348bff384631c422725b86775167ffc78f7f3dc9c3
File Path: C:\Windows\System32\feclient.dll
MD5: e6e1061ec010c1f1d80ab3f9d2a483ce
SHA1: 4294d4903dae309220f775ad8c678c7bf0653a6d
SHA256:734a26a13438782ac4109d9382096339c8be82db3030aefbb9010a5398435901
File Path: C:\Windows\System32\ffbroker.dll
MD5: c0b9c65bd1cab54e075c0a6509f7d25d
SHA1: 5a731c045572dd9324d41bb481c8e5cc2f9d5e26
SHA256:f64e4ec58b8ad15aa04a722d8fbb79ab72ab0f29baac5f21001db4ac44a3718d
File Path: C:\Windows\System32\fhcat.dll
MD5: f06deb9bdd669e2080435325efe64b97
SHA1: fb72074864b11def80141fe1ac44a85409355261
SHA256:e1d5a3ead515fcaff388661522e44830769acbcd340ceae1d075b42070a34605
File Path: C:\Windows\System32\fhcfg.dll
MD5: 7a6592a0b0e3160b16422451dc62acec
SHA1: fcd0eebd62548bec020f2ce30ee249e07a3dbdb7
SHA256:711ba1152723211aa2ed3be6d1372818a6e993653b3a9bb419a3767dd54f5860
File Path: C:\Windows\System32\fhcleanup.dll
MD5: 3bd0ec5766a36fb79adbdf8ebeadd859
SHA1: e3a0f6287ba9b5ef2b989f711f6c9cb1c0846777
SHA256:e078d5186dc55fcb22ade0e5430ceabdb44d80a027e3ea8d1fbbce7fe6c8f2ae
File Path: C:\Windows\System32\fhcpl.dll
MD5: b8344b0a320440cc746029d24bf1b9af
SHA1: 74ebc5698690595400e67f1c8de92da730966f38
SHA256:8547702d8c3d1f4751c6e570cdda18fbd2a5a35c70f4513416bd20f6af8f3a0c
File Path: C:\Windows\System32\fhengine.dll
MD5: 053eeca9cbb406d0a62b444e7eb076fd
SHA1: fd6fb2fcee8783fc651efd9ee93e4f38bb0fd399
SHA256:b6d26f5571d7d02f20705e5f0d4e53819bf5fd1d6f1195c5a13337e9f437bbe8
File Path: C:\Windows\System32\fhevents.dll
MD5: 4c7298359589ff63660eba7d9b2e0655
SHA1: bf85a41934a80d5799419d2da6ca903365d78060
SHA256:dc4268071e1c421aa95489b6df3713ffb69a2e081b923d84d3d07f377862f9cd
File Path: C:\Windows\System32\fhlisten.dll
MD5: 1248498f647de4b2aeb06441953ca7d0
SHA1: 78bdcb35a44694582133fcaba1c0aaf011ae0684
SHA256:b0c297307e67f45a0452382c3a60371d88d162a18308e598d0e0f079f718d65e
File Path: C:\Windows\System32\fhmanagew.exe
MD5: b4c4974e631c52c1b0a35e55ded7a350
SHA1: 85e5876bfb232fb8a345afa23e701e2569ee9192
SHA256:4889e9cbd663234f81c9d1458430fc5f65680507de4dbcd82a1ca897b59bdd5e
File Path: C:\Windows\System32\fhsettingsprovider.dll
MD5: 5fd602973c8dcb90e78b457764a8553a
SHA1: c20833ff31f11b5bd6e276ea1ae7e2b68c37e2ec
SHA256:fa77204ba558773adb5ec24a10e2ae55f23d2493a849210907b7dca2f212125a
File Path: C:\Windows\System32\fhshl.dll
MD5: 89732eac5612e82f0fca14d163eb0504
SHA1: 11e53170137403510c7936cb1500cdde305f8edb
SHA256:1a8e024755247d9086a8c111bdb984d35afc3a772f51d65f946f7a9b410f12ce
File Path: C:\Windows\System32\fhsrchapi.dll
MD5: 5474cabde4659caad1ea72bbc4c68dba
SHA1: 8cb3189213567400e678b6c5b98069d6a47427c3
SHA256:7eb156ecc98adc05980fd5487ddc292485deb5900457644a03b4faac0a47bdf4
File Path: C:\Windows\System32\fhsrchph.dll
MD5: 0175a2dac77e3de00db558e1a34c4556
SHA1: ec45d43d4e886bc2eacdba71b933b9afd12b20e0
SHA256:b38dde914f9cfe9e489174e54a04a34547d3b4cc40a03753a5eb01b5e6588412
File Path: C:\Windows\System32\fhsvc.dll
MD5: 1803215c934552985652031ef87ed236
SHA1: 3586089cc0a617c6ca98838952380fe24eb125ea
SHA256:2afb58ee1423e25f82a6f1a6c923d722be1dcbdc7e37999650701dba229479df
File Path: C:\Windows\System32\fhsvcctl.dll
MD5: ad1dd4eb85cd337720ffe5c97bbc2fd2
SHA1: 341ef4a2c96471111ae5501eb00f46547a79f894
SHA256:d6fb177e856adf9a5fa32045c444647549d2f825f3457a3d3bce21c00bc4011c
File Path: C:\Windows\System32\fhtask.dll
MD5: b7f44154c53ba3cf038ba965091b5b16
SHA1: a014151562e80dd9556da3bec7ce048144a592a6
SHA256:ce32b05f466c8e9bc252b55ed03b0cfa1053f74c3ecf143cdd7bf220d83bce97
Description:
File History Data Adapter
File Path: C:\Windows\System32\fhuxadapter.dll
MD5: d565bfe34d7ce2b9c50f3e484d4d2e78
SHA1: b33ecbca161bd497df5cac55831f7d59a7678531
SHA256:19128fbf4cb4fb0b267525610c713910df7db31d5f47f5049fee54b4ac5081df
Description:
File History API
File Path: C:\Windows\System32\fhuxapi.dll
MD5: 2deb8211e31048c0ac1dbbbd03ab28a5
SHA1: ae35a2e42ba58e980ab91d08b1088e91b35401c6
SHA256:18efe6f65635dbf9b1806d282fbab1718800769bf754699d327b23d5a917430a
Description:
File History Common Library
File Path: C:\Windows\System32\fhuxcommon.dll
MD5: ecc3796ba1f178447128839f2b8572a5
SHA1: 9cd0dabeb3c6f869ec7d7f5ce608ce7b30b40088
SHA256:770dd06fc1495b781f3314038c3b57058adcfc3189f84b0750dadb7743cdafd6
Description:
File History Graphics
File Path: C:\Windows\System32\fhuxgraphics.dll
MD5: 82a7ec5576ed30eea05eb2f059f5b128
SHA1: 7b92485bf913c07a6ba5e66f8726c3b31a4cfb89
SHA256:f1866d33d6e3ecac641b13c197b7fdf2b8a606d5f52770375672f10503dff6c9
File Path: C:\Windows\System32\en\fhuxpresentation.Resources.dll
MD5: b6f34ad3fa9a65ade3bef5be3a719c6f
SHA1: ecac6f349ec869a489e4c16ae0292c41fd428241
SHA256:f026ebad422e8d925e6984f75453b7b00c92082da2e1603f49c3ef46c75e2be4
Description:
File History Presentation
File Path: C:\Windows\System32\fhuxpresentation.dll
MD5: d7f0e67de6e25fb2b289f6b587d3172f
SHA1: add8648e23eb992d619bd05026555a63651b8bf6
SHA256:d2dc1f874e78214076e1d60023792dba7585f470cca2124d006d280e7f8e6c7c
File Path: C:\Windows\System32\fidocredprov.dll
MD5: 346c855231a515dcaf44ff70ade09851
SHA1: 10ff912b251b65647ed22d31dadf2b8e47fc45bc
SHA256:4949ed86a657bb2c218c47d1b8b5fa930a2272c5ca71681c8990a9e566965663
File Path: C:\Windows\System32\filemgmt.dll
MD5: 083de1660edba888ab108e9c2184dfa1
SHA1: 92954721b9b18f2f8921393f061677eeec0cabcc
SHA256:039f99f7a0f286cf6806558c8b3cc53a074c9df5fb86bb4feb9fa2dbea5185a0
File Path: C:\Windows\System32\find.exe
MD5: 4022d9d40ae3a7f27cc79988989a8853
SHA1: be23c681168a76d0cc9c13c0c2c25cf8e1425e45
SHA256:da020fbf74e1a08a5c21955a09b28ec62a6d160af648f6903ada401725a652b0
File Path: C:\Windows\System32\findnetprinters.dll
MD5: bd312893e6a4086a55b777d5ed977d29
SHA1: 389639baeb4df3f385fd6916690f1c9ec5b527a6
SHA256:1113cd208b8dc2c7558acee583d952f7323a815acac35dd4c89c172b7d445812
File Path: C:\Windows\System32\findstr.exe
MD5: 804a6ae28e88689e0cf1946a6cb3fee5
SHA1: fdc776e1297d6e6fb31f8eb0e85771d886a18dc2
SHA256:b29be6da54121f5d9350c545ececce26f30a7f209ce0d9aaea8e00c27dda27a2
File Path: C:\Windows\System32\finger.exe
MD5: c9085755f831f1345cf2b0a309095522
SHA1: 4c7d686de444bb2101934350a9357bf95260f4b4
SHA256:d6c52ea560d6009505545e53c481f1d75579e11dade120cf164ebd196824ba91
File Path: C:\Windows\System32\fingerprintcredential.dll
MD5: 83ff1268a4792afaa315e1d7b9acdd7d
SHA1: d6b011e856965ab433af481f566b9a844d76e038
SHA256:0ef12d807968ac84cb92755f5892c650c96b9b23624d0c350a23d118525cb709
File Path: C:\Windows\System32\fixmapi.exe
MD5: ba1bd07d48ef0fd88fdc98f9c528bdcf
SHA1: 87fc022a5930fede77a0a7dfabcfbc0a464e0d47
SHA256:6d1b62346b8247e27298b3d602c6330c15d73c25f5d1dcc7412a0bdab66c60ea
File Path: C:\Windows\System32\fltLib.dll
MD5: 26887aa90826721809ff601476710f61
SHA1: cf9deb1c95da7d84fcff036b94ca9b0ccff55ac0
SHA256:8efadea41916b544e3d93362c28437ab21aae978f1a3f5fa019ff4601f8a1af7
File Path: C:\Windows\System32\fltMC.exe
MD5: 0ee04eaffbdbb6f5d92ea2d75065895c
SHA1: 05a6ffc0dcd00f8f809f09b413a041c11a8b0249
SHA256:20000b0a1588885c712fe7d9b2e3938fc64cafa47154ebf8e372455f142a676c
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\flxcomm64.dll
MD5: d00ddd580e885616db3821bbda08181b
SHA1: 4416ec29ecf50a4fe52bcab6dfc3f5c4e1b0b6e5
SHA256:8788a92560e7ca64bc473ff6130a23772e8e58a3c64b8a7551a48c4f8898479a
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\flxconnect64.dll
MD5: dabd174dbb5bf6d1a40ebe54ee642d3c
SHA1: 70c0853efa1aa773208660875a68c0cecf64d3e1
SHA256:f55a6035fd781304387d526a6a49cb362b8e7a536588ebf521124dc1505ffe78
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\flxcore64.dll
MD5: 65e43328578edcae0ba5eda0aef6dc5d
SHA1: d17fffb1eb17ad608ab80d7b15a9e44f1743a54d
SHA256:24ef0e090546ced3651d3a7d3fdd6212b546424538b0ff6bd9ebf1279625427c
File Path: C:\Windows\System32\fmapi.dll
MD5: cd7f7d5bff3559fde6fcd68b5f29d0a7
SHA1: 54daaa8d71c723b96a658d07b804f305204ac57b
SHA256:cd375aeab416e68c62ed19bc2f2c5e59725ce3be1f92f2daaea0c8298917d4ed
File Path: C:\Windows\System32\fmifs.dll
MD5: 933218c1bb7fdd42b78c3aee8e5b6c09
SHA1: 751c75b36efda2eb8b79924b9f58646af972f5d4
SHA256:524f50b749d48a9f8c1d462194ea0c5c201b85643af46e1f5ae3175ce44ea139
File Path: C:\Windows\System32\fms.dll
MD5: 6ad05c6b074da8e8fa7409f6c81ce087
SHA1: 92422839a7c8d32da5f5723c86424f08a12fcc8a
SHA256:1bf0a22e2658897e342f12ff6d797d1b17d95fcd5b204418a116b9431f19baa7
File Path: C:\Windows\System32\fodhelper.exe
MD5: 85018be1fd913656bc9ff541f017eacd
SHA1: 26d7407931b713e0f0fa8b872feecdb3cf49065a
SHA256:c546e05d705ffdd5e1e18d40e2e7397f186a7c47fa5fc21f234222d057227cf5
File Path: C:\Windows\System32\fontdrvhost.exe
MD5: 646cc83364b05df69f1611b72c4d026f
SHA1: 94292795863b0f1f2770310f11134fb7fe8be888
SHA256:6638d1df1f96b280bf1a9a15ff7b25dd9277ad58e44d5871e37a269b7b02338d
File Path: C:\Windows\System32\fontext.dll
MD5: f05f0be2c2c7a25825d6d6117d9ddeda
SHA1: 9eb6cc98eae12469f6609e9d60fb0a06a3d39b95
SHA256:118d3408600623657ea3b4fcbeafb46e5f782cfed21053bb750c9b42f5712132
File Path: C:\Windows\System32\fontgroupsoverride.dll
MD5: cfaa0b21d3c2514d4a761d25fa2be482
SHA1: c8f918bac3d721bdf895f3423d72cffdf65f5a03
SHA256:ea56053b9d003ca1d62299ed40300510dadbfa1c4496ba34617f71a7b1b29b03
File Path: C:\Windows\System32\fontsub.dll
MD5: 3710c95c665cf5c9d5ab9a19a7df4ba2
SHA1: b0c964b03a07093eafad169db4776ea8084140b9
SHA256:1fa7fe9ab8df58beb0c81a1035ceb68c682abb1ecd3f958e5607b7642cdea0ae
File Path: C:\Windows\System32\fontview.exe
MD5: 81e9031f1baedf58510904df46f1e034
SHA1: ff885e19bccaa96b072aba8de3b60537ddb3c2bd
SHA256:c8a434b244421f0e075b1de0230893fe1b4a96bc51777cd0663b2ddd51428a00
File Path: C:\Windows\System32\forfiles.exe
MD5: 9bb67aea5e26cb136f23f29cc48d6b9e
SHA1: cabee28f7368aae1ac23f0713e2c330f96af2062
SHA256:9b4886f187489a190bb2c412772c1998539f086c63a4cfd72ff3b107cbc21907
File Path: C:\Windows\System32\fphc.dll
MD5: 446cbfaf5dd68f2568cb8f0b92e43d11
SHA1: 0f16fa1345d1203ef2cb3f414f23fa050ebb3a04
SHA256:e55f45a3d4e329fdfcb77f65d17a81285a1be3531ca706a4373a37a0410c4d66
File Path: C:\Windows\System32\framedyn.dll
MD5: e4b4f829ac5bd6a9c70f99bfa433d21a
SHA1: c3006531030859663d8d168c8e0677cd73cc2926
SHA256:9ee3b8287876f6a17c8a11c5a60130d182f5fb7ddd9569182969ecb91380a948
File Path: C:\Windows\System32\framedynos.dll
MD5: 4dd2dee156bc4509c27200f244210c5d
SHA1: 6543f4d368ac7390cfdf66d1447641a6eacd13c4
SHA256:cc2b6c398872236042689a5b4c20ff365da701247ae10e8251a99ce51b17a239
File Path: C:\Windows\System32\frprov.dll
MD5: 6f2eafa3f52ec9099071e82f8ca5ba8e
SHA1: 9221e819126617c8b4f61ca40c89e27ccf4cf51f
SHA256:7c6d0214b84f9196c104d233d95f6be6a7e4f8136dd1f756fb438c8c136381ae
File Path: C:\Windows\System32\fsavailux.exe
MD5: 9bf3b32a357fc15eb03df5f58752c393
SHA1: a5355ef7ddc3912c5630f56daba667e3b81519d6
SHA256:b6f49fbe12f91bec54cf7ec214f808db0dca04f99b71fae2f47a75ebae16521e
File Path: C:\Windows\System32\fsquirt.exe
MD5: 4b82d2be8cccb64674f42f27137d17df
SHA1: ae4bd32d038199c4f09fa3c59f8be9fb33a15434
SHA256:37c3d801cac7c59d15545dc76244827f9134c951d2fcb3a81fdfd2499a70562d
File Path: C:\Windows\System32\fsutil.exe
MD5: 26944ebca349d88d82ab0894771c8a4c
SHA1: 695f6f75922a0bfa26bcc39e4b3d348378c63425
SHA256:b007f834d64c48716298d92789a1e8473d0ebf680dcfb06f48b25b7a260bf0c9
File Path: C:\Windows\System32\fsutilext.dll
MD5: 6d529e84f8e73544c2d88b11e2c0c0de
SHA1: 36acb8a1b6097a07c48350fa84dcf4a159630133
SHA256:9efa8578eb79a0f6f1ca31126839f830e1727bc8a9b74e482f11c118b9125718
File Path: C:\Windows\System32\fthsvc.dll
MD5: 7333f603f783c0c60342b8155fd2f66f
SHA1: b14453d8b5eb4aa4fc0e64531f669934cb708d5f
SHA256:0b43e54341f90429f1347a96ccdc46f2f2aa3e7e342783e9f017df3b1bf4c3be
File Path: C:\Windows\System32\ftp.exe
MD5: 7db5a93b4113369b03d1f18d8325fef6
SHA1: 5082b57359a9ef6d440d5d1520a45e201442f146
SHA256:9728a3b5755a67a4ebe91a04730efcc2cabebacbb41ffca75a71b42502e3d7d5
File Path: C:\Windows\System32\fundisc.dll
MD5: 0e4cd43714981bcecb9e7c991ea2369e
SHA1: 37fc5a585804be7aaf0abde36486156652f7ab9c
SHA256:dfafb7467bffe93302817798f3223fcd58933cee45db1aa182bbf7b806b52ca4
File Path: C:\Windows\System32\fveapi.dll
MD5: bd43dc25de537a61b6d8b5c12cba209d
SHA1: 624139f80dd0c45aa1240fdb47053ec203d2f627
SHA256:6a16120a9be10aa5468d03b9cf724ce023e8b91306258a2dc514f58d114f20a4
File Path: C:\Windows\System32\fveapibase.dll
MD5: cb28ee107efcd3b7e5c3226b43d2c792
SHA1: ae6ba3b39b24701fa9cd0ade5abeeb7e2a9cc3f4
SHA256:0d60f8a8d895ab6122702360b36eee895e64e703f8cd398159e69b581938ebe1
File Path: C:\Windows\System32\fvecerts.dll
MD5: 30924f56250ac2e041e4f7311d80a8f8
SHA1: d2df5c6b6749a8397e1c8249fd3871d50673ec11
SHA256:0c0009fa02f4e8da0cb560c897432bd530d20880c9fae7670a4c6ee1bcf6f376
File Path: C:\Windows\System32\fvecpl.dll
MD5: 93203914858d97cf0f1179ba40e0e69d
SHA1: 0c8dfcff8c519c98c57acd2f73f89d163310553c
SHA256:7f6d8a08212ca9aaff670d8f0fc36f1794554b7cca24234268e14280dbea4be9
File Path: C:\Windows\System32\fvenotify.exe
MD5: 1dde0327caf5309ec597b21726028153
SHA1: d8325d665f482377a0622b6c70c25911f81e1a95
SHA256:b7fd898228effc5c80349b74175337486e43f327782b3cf37cc6c81ff5f934c5
File Path: C:\Windows\System32\fveprompt.exe
MD5: 1fdc5c40b2de4167895effcab0854c0c
SHA1: b89b0ee4a98768353d9b889cf133373df1b79dd3
SHA256:fe5098923f27ef6055e3343a26af9bed62eaa9eddfcb77ab06d2328d8497b112
File Path: C:\Windows\System32\fveskybackup.dll
MD5: 1b10baa55a997125832fa188fe67a76c
SHA1: 4e79f4693566a0d778aef9895221c540c8e3f988
SHA256:27ec9c1217839f62f000c1b1211c48000b33d10968db4e6d8e762f8bd39c1f34
File Path: C:\Windows\System32\fveui.dll
MD5: 24e17866cb847a06431dd0b1de3b0ef9
SHA1: 495c8f9f5853a5b07b72a71595f56e74521fbf32
SHA256:912389b09026e0e7b69de5f11b69c6514bcd98192ebd9bbec3d01a646ad23cf6
File Path: C:\Windows\System32\fvewiz.dll
MD5: 9e39cf1796666b38894f02e894e6fbf8
SHA1: 438a8840c0d7ac398f2c1e6bffa3f0660f7255b7
SHA256:cbb968d5e835c888be48cfd6b24188a32d76857b1525d61560be01729ffb8caf
File Path: C:\Windows\System32\fwbase.dll
MD5: 1275ffd8fea31c1ca315afd7a0743f19
SHA1: cf19a1ef082a80b76200e0bc55605ebf85316efe
SHA256:932359944d3eeb94ff25c76e6dfd2ec74b43c4763e8846c37b3312845739a0b2
File Path: C:\Windows\System32\fwcfg.dll
MD5: fa8fef9b7eae1e7a11b9a43d2b7c1f79
SHA1: dbd2b6f0f4bc791c201abdfbf7f63180b74506eb
SHA256:88303863c4e5124721719d942fe087cdc26c7fa76d19385bd896e4491c4b8d3b
File Path: C:\Windows\System32\fwmdmcsp.dll
MD5: e9f971a123655e2dcfb3a2812fecec99
SHA1: 670e68d3cf1163dc1e7fa1010b9bb0e95e92c3c1
SHA256:b573d2bbf33445e623fba5e1dd8b4e8048dceacac7e3e62806cd788807bd8af4
File Path: C:\Windows\System32\fwpolicyiomgr.dll
MD5: 8c7833a5562d76b2a8961930121346d5
SHA1: 7ae380a4463b2196a5d760366199235f7b7c88b6
SHA256:e989b915c330ff26dca223e191b316f59a044bad301353f24a6a457b0ad756bb
File Path: C:\Windows\System32\gamemode.dll
MD5: e8b0ce9ab5f81e5a68d9d713b5061692
SHA1: 3fdb54eadfaa3901de4fe3e08a628b3d4ae6dfe4
SHA256:00a9ae6f09e6203fb26baea76243475524f640b66397ca67937c0e96016db10e
File Path: C:\Windows\System32\gamestreamingext.dll
MD5: e68c5ff6ffd134aad91e97e6ad8a3dca
SHA1: cfbd88cb22b28725c15770e57871e14d44aa1645
SHA256:6b41e10b880742e9d5343d9989aa89ec6ad6c8554fbd004b0e70fd250b7525dc
File Path: C:\Windows\System32\gameux.dll
MD5: 829301c0867fef880cab174c7ac3cd51
SHA1: 0560b35451fd4cabb1b360a58f4077c13f8656be
SHA256:be3e2c7bd2f3e8c1e676da664b0cac1e6c682c927d38a5d4d3d1945e467de772
File Path: C:\Windows\System32\gamingtcui.dll
MD5: 52e2fe475e72abfbc0eb803cc86e72a5
SHA1: b1ce57e3dc43a8563812b7e25c559e50f2067326
SHA256:71e015d59374118526d8066100fcb202152fa1403ac2f6aaad8f827172b4a1af
File Path: C:\Windows\System32\gcdef.dll
MD5: de2e33d1e79b78b3f3ca4f87ebdf03ba
SHA1: d30f85dcc156ed1a99de2fb8cfc4feb24aac6cc5
SHA256:feb84eacb6f048f4f9b2f9f274a5ec59532fa0bc7edfb21a685d3909010ab53e
File Path: C:\Windows\System32\gdi32.dll
MD5: d9b128dfee53ed802f24e9004918edd2
SHA1: 2c93cb9c83b072defb8557482e01124d94e5962a
SHA256:a2e4ca9c9c43d94d297031cc5fb6504512a29c7f9b84493b3be270b74525ec5c
File Path: C:\Windows\System32\gdi32full.dll
MD5: f22f6d15d22d80f0ca4767cf884df26b
SHA1: 2c178425125a6d5eaa0025c2b38a15986189c59c
SHA256:5522d71da1f8c3641e5cc649e33e7f62a5e1d333574256c50dfbd52ecd3de8a3
File Path: C:\Windows\System32\generaltel.dll
MD5: ba820782a6d482c3722eeaa696e9472e
SHA1: bf78777d565eb9315f3a90fd6188e76cbe5ec096
SHA256:f259f71c81c822195a541810bc5847c57b23a94041dd18e134bb59389cf855d3
File Path: C:\Windows\System32\getmac.exe
MD5: 7d4b72dff5b8e98dd1351a401e402c33
SHA1: 40810fb6eee8856b1884ecb528c88b97e447c5d8
SHA256:467ce33b5145c6e71499f32139f14d81b47c38f11dca26b330367add263dba12
File Path: C:\Windows\System32\getuname.dll
MD5: 91c68038bfc064ea8fb6d432acd38ee0
SHA1: 4df7e33b6e325f31231eaaab366e2e710955babb
SHA256:68de057c4175d4c94afa2acb2abc1a9ccac04a3ceb8e84c33f7f414bb8b0eeb6
File Path: C:\Windows\System32\glmf32.dll
MD5: b53efda3e6140fef4df7f8893c8364f3
SHA1: 69096a79a66edda31c3b34d6444cc3b00ee4b7cd
SHA256:91dc00fa1248cbd99aadae8dbaea5430211ff40dd02502e995bad6687491f48e
File Path: C:\Windows\System32\globinputhost.dll
MD5: 8dd48c9be0c4a31702e3ad5bffa89b84
SHA1: e2e7fe271054ae943e28154b3676a562f9624e7a
SHA256:e2988317b51e75fb807618224edcaf6926877d0ec7e6d8d548531518357249c4
File Path: C:\Windows\System32\glu32.dll
MD5: 4cf0eca9948223e57bc55113e689c9e4
SHA1: 84c72047f91d7ef3a6810f743cb95d14b6875e3c
SHA256:06c1d64c1fc3788d40b8ad65b365f653f75b8a0f06129760a783c225814d16ae
File Path: C:\Windows\System32\gmsaclient.dll
MD5: 5731392eb424dcdd497a2a7c3e21a90a
SHA1: d56d888645e6f8a04b19441be69966fa4c081e52
SHA256:90e458fe92f4d306f49c75755e57c20b2fa5c0fcdce2a8458449150651a08975
File Path: C:\Windows\System32\gpapi.dll
MD5: bdaf1b351a589d014e9b009376f32119
SHA1: 23350ebbf9232b82cbada09253e4bae85a54f7ea
SHA256:8de1ecfda5f64ed3d9f6bc8d10e317cd8e34edadbe7ddadb50db066bdf18f488
File Path: C:\Windows\System32\gpedit.dll
MD5: 4ba3935d248137ddec750c942f16a0ff
SHA1: ec0900c7f1fb10a25ef9c8fee864e437c169ec25
SHA256:e76b9f22214121cbc93394099e24d901e400b587dd22249642bb435236c65365
File Path: C:\Windows\System32\gpprefcl.dll
MD5: dfb3e714c6228e1c04bdf03cda3bee42
SHA1: c1a2826487bf67430a35ce5ba058cf3bcc4d59b2
SHA256:9823100af09c378d13db46e853a002ff86a3e95173594bacbd6577c6206a9cab
File Path: C:\Windows\System32\gpprnext.dll
MD5: dc1dd7d6ae25ad722fc1b65552220b13
SHA1: fb810dd33ed761f711296d84c4400e092172c6e9
SHA256:89b1de0e217c7aaead9e953eae0010a9270011ef6b7c9f346faca0dad00ce46a
File Path: C:\Windows\System32\gpresult.exe
MD5: 5b309bb8de2ae2cf10da0f30a4f790dc
SHA1: 33aaf224af455b2143bc4548b0609667711d456d
SHA256:53d27f35b5cbf7efe1d96ef8d52475e1e6338bd16ea40b386f256df4e4e30a24
File Path: C:\Windows\System32\gpscript.dll
MD5: 1808f0932cf7e7567a054af09d6e2430
SHA1: 007781a7947741449e48ccc078979d41f489193d
SHA256:fd8464117e93978bbf87a0365a8b5792d27ceb85543ab8d46d62d0586b541e90
File Path: C:\Windows\System32\gpscript.exe
MD5: 8983cb1f0deb75c6da4e6fb4793f4d76
SHA1: dd5cdb067dbd81a87b6cd838adfba45ad3dd509e
SHA256:cc8e7c42270a21829c2dbdf64aed02ee33d5682044785eb79ba3bfc151f55253
File Path: C:\Windows\System32\gpsvc.dll
MD5: aa8ec6fbe24e29456c7a7c36280f2a86
SHA1: 04d650b7b562919b86c5447e95354d107e778ad4
SHA256:662e18e5a67539d7f6cca127002fe8030f5e44aca6220f929725b950e25c249e
File Path: C:\Windows\System32\gptext.dll
MD5: 2eb34a01f4e4ec0049b04a88087651a8
SHA1: 08256dc9ac84496d06dbb87c7a4b255c609e2581
SHA256:ce727dc4483d1e884c085de321a3644839098d8493bab0f67b7dec436c8b3016
File Path: C:\Windows\System32\gpupdate.exe
MD5: 47e384b47d2bb32056e845992e20964e
SHA1: 46e240cd883404b8632d91366fc75c76807bf973
SHA256:ec8e52bab421a42dc3c17837d3a7c519f034d8d03a62136b57c0989e2256d4f8
File Path: C:\Windows\System32\gpupvdev.dll
MD5: 998d359123ddd11e885fd67d8ca34727
SHA1: 997920f5bf6e4398ff2570a3c83882b3012a0326
SHA256:a6d76cb26b3764bbd5a213f7f79505a35d067c39ca8317e19a0804d30bdba1c3
File Path: C:\Windows\System32\grpconv.exe
MD5: f2e4e2805531e17d8ffb7336b1ebebf7
SHA1: f4665ea9f0e6c482020d822830b06a6451b67ad5
SHA256:1f9a2fe8a7730b4025f3c2a370a23d7b14b82c0a1b05b056905ca11c62e75679
File Path: C:\Windows\System32\hal.dll
MD5: 7156869c5f30463408b4bad06e2a01b9
SHA1: b0cc761f5c6674642151d7c310530c1f3848acee
SHA256:0074d0854a48cf299bb02fe32afbffbdb8596faec56ffd18a63e6b32dd9997ef
File Path: C:\Windows\System32\hascsp.dll
MD5: 53d188ecebf99bf880e7edae09bb1659
SHA1: 1c0d9207ee0b6eab42cccf78cc875c9d357f8d11
SHA256:b34157cb6f430ff4cc6cfd68db3f20885fd21b17b1d2e3cb8ac2693d9c3adb2b
File Path: C:\Windows\System32\hbaapi.dll
MD5: 665b26a43e6c12f7dc754bc1a3fc0421
SHA1: 74187a58f970f776be22fbc721ddd38a6644615d
SHA256:ceb8139599bd2eccf416e16c0a604227b42fd21e99d404479816779c115e53cc
File Path: C:\Windows\System32\hcproviders.dll
MD5: 9fd9d2e244e95d4bb42b0e680db6b270
SHA1: 932ebd2260a0fb2bdc51b641acb8d916e4f34403
SHA256:c325acdd5c2a1058ee71eb606e2c1a98fd4cb07689aab7a0dc14040a41ce14e9
File Path: C:\Windows\System32\hcsdiag.exe
MD5: 02c73994cd5c6f22b0ff215dcff84ac4
SHA1: a1e75cda7dad56b54afdea404d55d57a0627464a
SHA256:267063e09cc02f27f72081a7cf41a73f8ea00ce53fe4c3d586148542469b75fb
File Path: C:\Windows\System32\hdwwiz.exe
MD5: f56e9258da93e144bf62c4e0badb349a
SHA1: 4bd81a3dd101b33c786d0ea4615cf583146f73c3
SHA256:5c77fe684533fc41685a2bdf757deb2b428ca342d74697d06a2c9b5aa0de2ff3
File Path: C:\Windows\System32\help.exe
MD5: 980741acd376f0049ffe81df19187201
SHA1: b07bda5bc58eb4f1721280709f838bd21c501d90
SHA256:cdcc70d77775a9fadc1d6d70d8c8f0c83d7c9abdb3507254af5cbe64c86a3aa1
File Path: C:\Windows\System32\hgcpl.dll
MD5: 4ffe086d58d20b5c41b88d52c5feace2
SHA1: b9c5eb07b4423cee96d75ded33f0f18578947231
SHA256:cda56234607744ffb92494579c711f0a35d8f9f90d9f02deb402046905b38f4c
File Path: C:\Windows\System32\hgprint.dll
MD5: 921f48b6fc2eedd674550a05903674a9
SHA1: 6365a711af71a7b7ef96c10ca622e489dcb2b6c9
SHA256:3aaef101366cfbabe4dd97190d1f12289ab739f28b5113637c9f616676d89bc8
File Path: C:\Windows\System32\hhsetup.dll
MD5: 5cf0ae38c81f5ef201c2e6e8ce7d21ba
SHA1: 1e18c6f4d57e670722349ea946a95a1096b89f61
SHA256:9a445321b4859118de65232a2bead82f6d17167af2addd697c91dd3fe65ae0e0
File Path: C:\Windows\System32\hid.dll
MD5: 8566b7a8a70515009f427268b0cd184a
SHA1: 009d9acdf228e8263a983c060c661bf0c762afa0
SHA256:592de4b8c6b99600d0d1e5bc6fec4accce303ba03c736c0c325f6766439bfe1d
File Path: C:\Windows\System32\DriverStore\FileRepository\hidscanner.inf_amd64_b4d877fbd7faf471\hidscanner.dll
MD5: dc49512fd487e76f902d9023722fc5fa
SHA1: ed5c6e10575a7fe939659357805df01ed0b1ee48
SHA256:678a718647b162717dff6d495183529970e6158de62f1ff353008a688a22bef7
File Path: C:\Windows\System32\hidserv.dll
MD5: 2a41af60430e686985e9101c07a77b80
SHA1: 0dcb0c8a19ace4f2a27cbe7075cafc544ec0155e
SHA256:2b6ec0692a09e5943c5bba0e3aefc746e96412e1836c84b1857b4dcf242dd28b
File Path: C:\Windows\System32\hlink.dll
MD5: f43df1b40858ae48a08a36276b85b50d
SHA1: 0613a491548b8a4faf50fff854d759ea85428f3b
SHA256:bb78f986d660a23deecee307345ccc3f3e2ed10dce2982c39f4ca3a8063e3aa1
File Path: C:\Windows\System32\hmkd.dll
MD5: 8941c03ad8dbe1a0fb8b221cf556dd3e
SHA1: 809d794cfd5ecbd46b0fea215ec2c47d118c47a6
SHA256:73dc263547e05fff4baf7bbb462f35af1b957345ae4a411086b02e87cff5b58f
File Path: C:\Windows\System32\hnetcfg.dll
MD5: e883ead4177aec7099ca089d914ee65c
SHA1: 5eeca3852d90812a909e814aee3dbaf0e7fea4b4
SHA256:dc4d2c348d4612bc5784a45d080d5d52155fd74dfdf61e27279ffebbb183ee6b
File Path: C:\Windows\System32\hnetmon.dll
MD5: db2dcd37a2c0e5840f4978739aa020e6
SHA1: da885664bd4ddd2268a153a3ec644264f16ef5ac
SHA256:9bd2e6214afd90348dcdf2742d0e868a5acd5b0d3371a8f2a379eb073f9784f0
File Path: C:\Windows\System32\hnsdiag.exe
MD5: 04c60450c65fff8320968f4e64bd663d
SHA1: 3230d8b609091e124aa60023a314d164269f71b0
SHA256:da922cbab21afa6a6c9c4b839273b418e912860dc564ba1fed46c9716c18a1bd
File Path: C:\Windows\System32\hnsproxy.dll
MD5: 419757255bd032b7c1ea5ed35d10305e
SHA1: 973f505e9a93a1ea3f7a73bc77e3a6e0299dceae
SHA256:a7e7fa1b1d5c605fe3b47ba8ece021565979c2bde767d7900ea3297fc779361e
File Path: C:\Windows\System32\hotplug.dll
MD5: a326bd6f5af6cba6a83acd1b5feb6c79
SHA1: 05445d6382ceef8edfe3ef3853e78b66ff46256d
SHA256:6b11de1e680ef9ffa979f75ed12319a1eb90b01bd68665db7f7e3042f04fb88a
File Path: C:\Windows\System32\httpapi.dll
MD5: 86bb99b68de8a8f1da819d24939b89e9
SHA1: 1c5046e38f655059e11d54bebbe63f1e06750be0
SHA256:89deb43acef33f05fc4623a52746afdc5bb364c8b14044b9b782509508efe119
File Path: C:\Windows\System32\httpprxc.dll
MD5: 3fda58ad2e9bc3e73abc57c44e2ca922
SHA1: 16841862d94516b6f4a2a9d6342c874cd8ff0cb9
SHA256:1fc81364857dd8dc0983aa4bc6d64f2ff3c74aa6862cc9b3989e6744e6cc8ab5
File Path: C:\Windows\System32\httpprxm.dll
MD5: 60a983848c057a4658fe54027df5f687
SHA1: 592ff97d07cfe2b8eebf627a6109a970f1de8fbb
SHA256:90bb2003db5006091c11f00274050c0800fc1c3d64281f15ad59176ebf31ac4d
File Path: C:\Windows\System32\httpprxp.dll
MD5: e4f41b1cfc7fbc7a7fc8ddf5e6d0cd7c
SHA1: 8702138479da9bb7b8d6f44ac749e22837b1cb36
SHA256:f5365cf2513b071a02d36de223a05d505549807719060d3ab55a8274f78b91a6
File Path: C:\Windows\System32\htui.dll
MD5: 988fef88eabff667e3b16f5ed02de5b6
SHA1: a1f0c6526a2107e53e4738282200f2bd4517f968
SHA256:4c9b2df952326ed7b7a265dc79b0feb99d1a0ca2793f17998fb223cac503efc5
File Path: C:\Windows\System32\hvax64.exe
MD5: eb15692c7821b9b263e51399a7226fb1
SHA1: 32df885f4906520db1e5940da48f074f6207afbb
SHA256:43979189b53fc082725673c67008c5506a7dd47294404f627666e9c0d417395f
File Path: C:\Windows\System32\hvhostsvc.dll
MD5: c557215075d111a5c78a86c62fcc0456
SHA1: 782d025671b09bcc0667bb31dca7ef7125ac55e2
SHA256:dccc375f27bb95520fe9ad2338faa43fc7efdd767afce6972bcda3ffa80604fd
File Path: C:\Windows\System32\hvix64.exe
MD5: 76c965377038dbcde88ed60f297a6490
SHA1: ee274e1be4a5ac4b35c046ce5cb05c66db7c7515
SHA256:7ab15405333b3c43216a56005373c91d2b2bd362cd0745da6f05d55aab3e5ef9
File Path: C:\Windows\System32\hvloader.dll
MD5: de9ac28896d253a2fc6556f760edad56
SHA1: 21299bc7cae7b9545ba03278014bcf558128197f
SHA256:233d42c939628be1ec0dcfa9aae735b94d89bab5fa7378a42c36b582a66bb9a9
File Path: C:\Windows\System32\hvsievaluator.exe
MD5: ea2335ca9d5bbe076c0799230268678c
SHA1: f413cdd42210ea8455584e6f87a413dc6270e91f
SHA256:d2d3f10b1927aa6bf2c61a9324d5c908105ea482b6a619a89ac264f14763e994
File Path: C:\Windows\System32\hvsigpext.dll
MD5: 44799726c8969ab4fff0fc206288cde5
SHA1: 47a3a35c83946dee3ac747b45c924f4c5a707f2e
SHA256:bedf3762558f06adb50089b3718f6638ff09d379dc9902c0128967b14902028a
File Path: C:\Windows\System32\migration\hwvidmigplugin.dll
MD5: 18c9e269a5375b6a8a968ba4f80b678e
SHA1: 9ffffaab036ca190ba33b62f125fb657929f4bd0
SHA256:56b248762ff52379ebb788616d860a5d951504a9679de75b7b7187d7a87368d4
File Path: C:\Windows\System32\migwiz\replacementmanifests\hwvid-migration-2\hwvidmigplugin.dll
MD5: 4b47c77bffe4b18cacd736985b3ad403
SHA1: 37c312364a6df9d1780a095f89dd24783d4c6021
SHA256:1ab5939b3320ae5b39dbbc029f95b42cbc346656e6b2730ee0087f847401b8c5
Description:
iTin.Core.Hardware.Specification.Dmi The Desktop Management Interface (DMI) or the desktop management interface, standard framework for management and component tracking on a desktop, laptop or server
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\iTin.Core.Hardware.Specification.Dmi.dll
MD5: a8f72b9306644e85b61679315fa467fa
SHA1: edb5a0f7ccb1f7fb0afff05841af5019ed6734d4
SHA256:67fe7350d4b789f52d39c29a78ca75d77a6e9bf52235e56ad3746c4dec808a4c
Description:
iTin.Core.Hardware.Specification.Smbios System Management BIOS (SMBIOS). Standard format of the data collected by the BIOS. SMBIOS defines this information in a series of data tables, where information about system components such as memory, peripheral devices, expansion cards, inventory label and operating system is collected
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\iTin.Core.Hardware.Specification.Smbios.dll
MD5: 59a0d306e4975a7cefcafc8624b005f5
SHA1: 2a4e5996270c8b2c5259239e5ad128144defe77c
SHA256:78678660f310910eba66cf4c764bff8593b2e8098c5962cc4da6f87f35b8386d
Description:
iTin.Core.Hardware.Specification.Tpm Includes TPM (Trusted Platform Module)
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\iTin.Core.Hardware.Specification.Tpm.dll
MD5: 05e9f492fb134ecbd8cfdda57cfe9beb
SHA1: 28c94d5f898bdc27a12144ee469bd510bd1fbeb0
SHA256:1cba3a8f4054d3ef0689e40fbabb5b039b7d8f59dd1a73bbcc5e0333c02b9306
Description:
iTin.Core.Hardware Hardware Interop Calls
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\iTin.Core.Hardware.dll
MD5: 2e096f282469f189ef680d4f6e3903b2
SHA1: 2cac5feca6ce381af099cbb6f135669040329649
SHA256:9f940bc3be0ced837c22d00403bf731b2f629027ea82f2ea8ffbcddf88dfc518
Description:
iTin.Core Base library containing various extensions, helpers, common constants
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\iTin.Core.dll
MD5: 605ae51a4a6b596f1d97069a86260e05
SHA1: c88049facf60adfc64bc09b3b5c18055890e4962
SHA256:bc3acd47ca01e14d83bed02893e749a3c4cb7d68e709e081381844e1569cc74e
File Path: C:\Windows\System32\DriverStore\FileRepository\iastorac.inf_amd64_6ca78a08b838e305\iaStorAfsNative.exe
MD5: ca1e8c261da5d9ec067c652c0988e287
SHA1: 0b81584c7bd978ece08381f95771cd14edf90fa6
SHA256:f01f9e53c3ab08b610065528266c9d0ebe65137b49c5ac139b713230d8131175
File Path: C:\Windows\System32\DriverStore\FileRepository\iastorac.inf_amd64_6ca78a08b838e305\iaStorAfsService.exe
MD5: f85a3bd8bef67572a954474168dc3397
SHA1: 249a611763536eb855215654f3d1d6ac241d2d86
SHA256:8becd3e087ffb13b5edd45790c1161224596ce08494c308f4fb44305b2019ec7
File Path: C:\Windows\System32\ias.dll
MD5: e08b738de4cb87945c0d2a8eda581461
SHA1: 7d530009efcf0b63bec1d8c78045ffe40a9fd7c7
SHA256:abe4303dfc7a904f365183f0f07bcb6a2b62c36ecd78ee22c6ffe624bb1be2f6
File Path: C:\Windows\System32\iasacct.dll
MD5: d571f5a730198482a6a4063a04bf2c81
SHA1: 0b40f40263fbe7a2d723edf6a322997eb0b0dc31
SHA256:c7c8c10a58f3b3c2935adcbc9ab1229dd76763d748d0d0ee1ec9d62434510264
File Path: C:\Windows\System32\iasads.dll
MD5: 70fb1cc427262fefe6231517d8800101
SHA1: 5efb8115e2b16de6c397eb711d3e35cd11db7381
SHA256:325625103b3d9028d0b6d80fa46aad6f7be08a20a8820cd055f1aab57923ac8f
File Path: C:\Windows\System32\iasdatastore.dll
MD5: 8a6d30a73f0125058afc9f72c3c929cc
SHA1: de0e4b93200dbcf406335da0b8d27e910eaa597d
SHA256:0c6f65c081def0035ce3a8510b657e5dfa034f302f2922759bd6494d5143e4f5
File Path: C:\Windows\System32\iashlpr.dll
MD5: 627d35f01e6ad6362b5f034a5d049098
SHA1: 0e9c68dc6440b97edcf0f27643e11ab3b58ac7f6
SHA256:74fe765f25c47ee24621fce81adac3c1f7a69bf5da62ad0cb68c26c0087fe70e
File Path: C:\Windows\System32\iasnap.dll
MD5: d2c118fb404d24f5d21f04d92fcc83ba
SHA1: d55d4588d0517abf0b744ef70d82c109798a13ff
SHA256:58fa59964de360bba6304cb30ab9abc55c30c7c1bd5c19983b2d5fa9c3a7868e
File Path: C:\Windows\System32\iaspolcy.dll
MD5: 98185d93c66475edc081a02a40c5376f
SHA1: 293a70856bb42ed9aefe259d0a55061c9f91b4b9
SHA256:e69f829f35069ad30a6a77ce39a551f7118802ceb8b0c0dac38015473c9eccf3
File Path: C:\Windows\System32\iasrad.dll
MD5: 0bee91b591e42f9a407a4e47b8579254
SHA1: f8da027c20328b76f5db6de1dd0bc4b2d5f1a735
SHA256:c7da0aaf345d198b84eea2785193ef62fd2eef6a967aed5842c23ad194e383b9
File Path: C:\Windows\System32\iasrecst.dll
MD5: e2432c670ead120415cb7721def442b0
SHA1: 171fb3d6b35c08999ac5ec3521471d69f3396185
SHA256:9e26a522c9aa4c8185e1127b67b6b3d9e8794495127d0678a81167afd702f4f0
File Path: C:\Windows\System32\iassam.dll
MD5: bdd70c80576ec34f1abfe57250d4259d
SHA1: c947eee3cb709e62a2c3400de6ff6b261f9904d6
SHA256:a6073c09b26e437a322652077ad31f8fdcb37f196f348a55c0299f19c94a0338
File Path: C:\Windows\System32\iassdo.dll
MD5: b5f4e0cd17be18fb982b79c0204dede8
SHA1: 9cff20e345d7dab33d21946adc393a66eb8a025d
SHA256:24969efee57dd6b39c1fffbd11c91eddbfcf61324776f1049635271bcf91e141
File Path: C:\Windows\System32\iassvcs.dll
MD5: a623bcb232fc188dd42886f9ac8614b4
SHA1: 5083cd6214b875409aaab8cbcc0f5b92d3795207
SHA256:258f314b8a9e64f7db9a5937b9250b9c46ce9d1c4d893d3ccc08518413d16175
File Path: C:\Windows\System32\icacls.exe
MD5: 48c87e3b3003a2413d6399ea77707f5d
SHA1: 2b52b53fab6c50f3852f55b786ff16d7fe25bcb8
SHA256:222ea0e9d8ed1d337dbaedd75a13b8f28fa5c3711dcdf4307e75cede5b5f6b9a
File Path: C:\Windows\System32\icfupgd.dll
MD5: 6daaccdf0fe72326e94b6942d895295d
SHA1: f49a9747ee2ce4288956a4992089e31a0f574f0a
SHA256:710ceaae404968e194599e8b60fa84a8e16a905ce73fb12a1c46fb2a3c805b66
File Path: C:\Windows\System32\DriverStore\FileRepository\iclsclient.inf_amd64_75ffca5eec865b4b\lib\iclsClient.dll
MD5: 6275a9979fb2cf0a713c21462159664c
SHA1: 364571e90dad61b0386849eae4f75cffa3ae83cd
SHA256:028d97230dfa866698ee406d54695ca1796ccfce547eb0c2635eca5bac1ecdd5
File Path: C:\Windows\System32\DriverStore\FileRepository\iclsclient.inf_amd64_e936ad8266d026ce\lib\iclsClient.dll
MD5: a565ebb256a2eddf2bf6c9f40de44498
SHA1: a06b58783e065c3984cb3274c94aa447457480aa
SHA256:848f4af5a0be863c2adfd965a93f9c9e391f84ec070435af09ad2b34e223fe43
File Path: C:\Windows\System32\DriverStore\FileRepository\iclsclient.inf_amd64_75ffca5eec865b4b\lib\iclsClientInternal.dll
MD5: 715f51c8bba9fc4e20f95ea381b586c6
SHA1: d8192dc0cb419d947239a9082340275e21c1533b
SHA256:81d99a413dfcb8cd2bfe3e2d6b37963d2f22c8438ce21d7d3949c44ef840d2a7
File Path: C:\Windows\System32\DriverStore\FileRepository\iclsclient.inf_amd64_e936ad8266d026ce\lib\iclsClientInternal.dll
MD5: dd2695708be609deb8c36e8550c5a402
SHA1: 472df8566c03cec014b2e8048f46e2fe23285413
SHA256:f2b0571118ff566098f3489141bc2fe9ee71ecdaba4686284f84da8e74fa0ef2
File Path: C:\Windows\System32\DriverStore\FileRepository\iclsclient.inf_amd64_75ffca5eec865b4b\lib\iclsProxy.dll
MD5: 2adc4ec7137ba03881509f0a4015c0c8
SHA1: 85933b1af8258be63301567dc04da1c843be33cf
SHA256:1081f67cf7ce779fdd3844291a642fd7dde71478c36a774b252ad670ab6b8fa0
File Path: C:\Windows\System32\DriverStore\FileRepository\iclsclient.inf_amd64_e936ad8266d026ce\lib\iclsProxy.dll
MD5: 77ce3c8f1b1b93b7b40cbf7709dde7e4
SHA1: d381ab502b815276b9a58c3ef50c6e75a5e99de6
SHA256:156b1f8e6d131683d7055b67b2da8fb94cb501cc27274903a06d09e4678c9d7e
File Path: C:\Windows\System32\DriverStore\FileRepository\iclsclient.inf_amd64_75ffca5eec865b4b\lib\iclsProxyInternal.dll
MD5: 5d82e7ea27d5f3f29a36c420d853398c
SHA1: a4553569e99fac631e62c070075de9d9e78148b3
SHA256:76df0393eccf5cab14a61c48d2240633790b008a98cbf65b3207f99087885141
File Path: C:\Windows\System32\DriverStore\FileRepository\iclsclient.inf_amd64_e936ad8266d026ce\lib\iclsProxyInternal.dll
MD5: 35dc3b8673bf205381485387e48b9996
SHA1: 89bc956b509f070accadade737edf8311d65fcd0
SHA256:c279676203e028f6fabeebe0d2396f163c4d7d983d74b0f8d7932ca304e4287f
File Path: C:\Windows\System32\icm32.dll
MD5: aece3069b9e33de04aa859999503e9f6
SHA1: 46d9042900599c2c7a34ff281f0bd49392191c30
SHA256:21c9adba9eaccdd832ece08ccf1ab97cfb095b01cdc35d453d088ec0880fb2d9
File Path: C:\Windows\System32\icmp.dll
MD5: 9a29876347a6b7a9fbd942c7181b883d
SHA1: 50b46e949c943be0bbd728190ef6f6af9abd6885
SHA256:44b8db2fa33f94746495ac3e0d4a05663c2fd1af576ad4976ff16c5b4800f5ad
File Path: C:\Windows\System32\icmui.dll
MD5: 41e77fbb31953afec0d6757cd9a953b1
SHA1: c9132bb4bcc20e209b3594363d0608c5df09b288
SHA256:5a8e287dfea8b07d146a08b1ec972f9bd56a77f088fb4e4cd90429a844cf60b2
File Path: C:\Windows\System32\icsigd.dll
MD5: 2639dcb5132c71723ae34803e5500884
SHA1: 3cb7a94610f445fa5c2f208003e38fde08548003
SHA256:ec680ca75d4cbcbd70aee0682efc7c6b55c55acb4efbf227ab4f87e7e7abe7a1
File Path: C:\Windows\System32\icsunattend.exe
MD5: b066a4c29e30b719b93867845bb7b02c
SHA1: 34246cf3a1c7b7412f67f80bd4ea5a171ea4bd67
SHA256:4ece61692bc3268ade0540e1b198a19b7acb9a9a4ec143b0a57d042d6f02ead3
File Path: C:\Windows\System32\icsvc.dll
MD5: 387c95ae002ce8c1ba1e3d9e4406a188
SHA1: cbb86a30b4117e0be9be65cd2de04ec8178ab20f
SHA256:8f0e153f6abe46d1dcb5fb53fa79a6454609f78d7410472ae41d4f251da70562
File Path: C:\Windows\System32\icsvcext.dll
MD5: eaabf8b8fceaa0804d1ba559741f11b4
SHA1: 9047ab9d79d91a12da800adc01851a003a794e5b
SHA256:414205035a2d28e55b29f0ef5c661d4c1d1d8a6c4367ff54ecdcd2b1d4460b97
File Path: C:\Windows\System32\icu.dll
MD5: f7e73497fa0618a4eb02b5c433db368d
SHA1: e859ad242b41be4f60031af6665a46ac45ef92bf
SHA256:67156cab8760909ed94851ce01036778d160e24dd5b4d088a8acd3b05bd05cea
File Path: C:\Windows\System32\icuin.dll
MD5: a7b574704574f326b92dcea872f1e9e1
SHA1: 0b04f6762fcc5daead988a560e61722884bcea19
SHA256:3a71fb84c0d1b6646e5fc77c55526f40f8a2aecb28e24215961b771079f2abf3
File Path: C:\Windows\System32\icuuc.dll
MD5: 4a85a9dea3d47d95cef5525586756ea6
SHA1: ccc3219ec73f6f63a73167f237b21ce6deb2bc7b
SHA256:e76201d65fc58d1db0ec99bc8e875f47d692bcaa16bb6448b197bc86c08d1816
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\id_enclave.signed.dll
MD5: 785f8c8ae5fd5a72c5c46f1ec0ba4f72
SHA1: a000f1574925d3eaee34fa459e41234b387e9bae
SHA256:3b708fffdc5bb271c14d73a5907934c6376b595f2cd25166015e94ba2873d1be
File Path: C:\Windows\System32\id_enclave.signed.dll
MD5: b038da469bb72c4e3183329ca0504919
SHA1: 8c48ecb3eadd7d3ef0acb846dbb296cee9bd0c05
SHA256:c8c4180a983a265d632144655a6dfd78881968eda210666248285ddc6b5afed5
File Path: C:\Windows\System32\idndl.dll
MD5: ae8cb604ffc716fcc28535b12a04dd10
SHA1: 693a7c0ceacfd0361b356a406d03d9e4a587028f
SHA256:2d3a9a16344e0ea541522d2807b3302f13cc974ed3a111bfbfe520440c6ae9cc
File Path: C:\Windows\System32\DriverStore\FileRepository\idtsec.inf_amd64_9321d33f1997dbfd\idtsec.dll
MD5: 0368c42b5a9c44d5a8e2f79758965e87
SHA1: 3b24dd03b6c196ae39980323c294326eb3369cec
SHA256:0eb0196a947d10f476d6b754823f5b567d5d8a6129545ad24bf64f1f369bb1df
File Path: C:\Windows\System32\ie4uinit.exe
MD5: ed9990b26cc0146889e2f6feb0d23f95
SHA1: 927517703c51f5fc4c0fd8e18ba6af0fdbd6833e
SHA256:a098767de9df744609c10b92dfe8299f710d57bb20dd51ccdc9b2ea1a48500bc
File Path: C:\Windows\System32\ie4ushowIE.exe
MD5: 9073d2a5db5c18abf9dd4a841eb840f7
SHA1: f9a60e6f1fe5180a152935af9955a66a1cdf5d2d
SHA256:956faba6af9821ec111addbf09b33b45db248d815ad2ecaf844f7380bbf5e551
File Path: C:\Windows\System32\ieUnatt.exe
MD5: af3dabc52d7f3de38e0dc46ff19512af
SHA1: 2817e3048af2e932f19214038dbfc2ca0ff50240
SHA256:9cf85bb506087bf96e08fc09b836a9d11fe17b6d2ea7b4aa2366e0a555192517
File Path: C:\Windows\System32\ieapfltr.dll
MD5: 8e3d142e5df6c6c0ed6230c3d9d8466b
SHA1: 4c33a80007abeecc3e5c2e745e3bc7f25419fed4
SHA256:651c5b9b6b21d801e2b933d86e259dd007adbd49f532675a84a5c5ef33071ddb
File Path: C:\Windows\System32\iedkcs32.dll
MD5: f6ea4e147f68e0a2f38a9df4fd82bf2c
SHA1: db297f2c66999a7152c64c0169a93e6cad21fd80
SHA256:bcbc1c9647ddb861a57b96a6f60ad1c6872854c38cb89957aab93af113dbc81b
File Path: C:\Windows\System32\ieframe.dll
MD5: 240dff755a0eed36ff9dceee3d78160c
SHA1: 71aa8a4c5ab1409df0ccd1a996af08fbf25c63a2
SHA256:7a3e1226a4fcd0c01a32841590072d5d531374dfad76c7ba6a70e32224f05d1c
File Path: C:\Windows\System32\iemigplugin.dll
MD5: eacd7f70eb692124f0ee70ebb0a8a357
SHA1: 58c984207717cdc67079fa5903c091e5dcfca9b1
SHA256:75b377535f89fa785124756894c55ca9fd9b81d55669719795c2646090bf4aa5
File Path: C:\Windows\System32\iepeers.dll
MD5: 4d7fc2691a6b750cd8e483404fbffdf2
SHA1: 13a51de4209e3ba8bdd536a5524a96dc2039372b
SHA256:3eac1b7aaa9e939028c94702fab03e50d4c9b81b099ad0e9ad34860907cc8170
File Path: C:\Windows\System32\ieproxy.dll
MD5: b00186b3b6be71a73beea9f1e0167ccf
SHA1: e091be00dfb521f4e1356bdc2c5550bc12cf72bc
SHA256:ff6a74afd50040d0952776a3b628dd8d798638d8448234dd7f823c0b38a12823
File Path: C:\Windows\System32\iernonce.dll
MD5: 0237931909fbd46ae682f962a92ee465
SHA1: d9e0a2aefe9ddb4702f11cc5d2793aa8c06faf00
SHA256:a1067d224e436aa6e8b78d311f430ade342741deecd2b68876ca6f30e740a11d
File Path: C:\Windows\System32\iertutil.dll
MD5: fe0b9be87036827debfe7408a20d97bc
SHA1: 25821b297147360000429e68e67574b48391d161
SHA256:3b5cfbf288f37ffdada4a1ed0d35ede5bdba399ab349053af9e7127261e3c43c
File Path: C:\Windows\System32\iesetup.dll
MD5: 5027ce797f33a24bd3b3a6f8fbce0240
SHA1: b2d7f52a8a2dd008355cfff35739dc70c5323d51
SHA256:53308cd14ae34b66fc4850c78d14f6a52d4d20dda0b38d88f6a5d93dd94391f5
File Path: C:\Windows\System32\iesysprep.dll
MD5: fac7ea9fb6a80fdbbd4f67ee88e47edd
SHA1: ead9271fe88e64ed2d7027f9fdeeb154190fd4dc
SHA256:c302818ff5554108f01b1847190f1b38ec3ddae5f6a597157163618b3263494e
File Path: C:\Windows\System32\ieui.dll
MD5: a26533a425d9d4e68f0582f33ac76081
SHA1: f34dcae922f3aa25790382beb192c91934d5d85a
SHA256:7be12850c07d65f0f64c5855c0bdb977d72c297246b732733bff8a5df5b59782
File Path: C:\Windows\System32\iexpress.exe
MD5: 17b93a43e25d821d01af40ba6babcc8c
SHA1: 97c978d78056d995f751dfef1388d7cce4cc404a
SHA256:d070b79fa254c528babb73d607a7a8fd53db89795d751f42fc0a283b61a76fd3
File Path: C:\Windows\System32\ifmon.dll
MD5: f256577e991ea8dd028fe2f140bc7855
SHA1: 541ad0247152deefc4576eb7a5e0e8010347866b
SHA256:b818524eacaabf3de2a119419fc2b158425a0fa7723d120b49ebefa40f689858
File Path: C:\Windows\System32\ifsutil.dll
MD5: c714861d1d7e34a78a94e0d5a47a610f
SHA1: b7ec10a41bd087a536d0f47409ce65e36c2affa3
SHA256:b198ab6b0b847d6654998c1c32710e1eddaab928801925a1514ef49d478e1d14
File Path: C:\Windows\System32\ifsutilx.dll
MD5: 27a7213091cda31e84967bead4d29bd1
SHA1: e705e0fd25167c8cdaf984f067e3bdf4be8558d3
SHA256:42214053995b6188b2e20935ca8c92af77639f0d5541a132920a5cba2cfcbde6
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\ig11icd32.dll
MD5: 587d329ce28367e27ed3bc1ed2203af7
SHA1: fcda6d4760315485164ffcb70830212ef474263b
SHA256:7b71bbd95f178ca2bb5a44732e3abff9099dea8b908a71cb21948ee8fef819d4
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\ig11icd64.dll
MD5: e241d261deaaa01a8a3c2f173c9455a4
SHA1: c0b908163027f533c3281eab7d9500690e37c33f
SHA256:9704548e7d85f7c89dabbc2bfdd29d93809f7e4a8a583d8b1c9c8ffa0f9dd148
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\ig9icd32.dll
MD5: 5b3bd449d36bf7f11373a4646121dba2
SHA1: 8bbbad78da3bdaf0d583f2e4ccdc163f0d9c1d4d
SHA256:dc803aff5c0f01cbd16cba31a4a4b48adf8fc53eda3ea1b3f065d686b88bded7
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\ig9icd64.dll
MD5: 7620bbd689bbb976d97adfa6ec8fa4a4
SHA1: 90347c62a5c9df773d31a00bcce523ac720bdfbf
SHA256:642ffb2f9ca6f02884b1500899cf565c465103533c489f34e4b5f8baa81a45c5
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\iga32.dll
MD5: baf1952f5a02da8338fb0045c30c32e3
SHA1: 946d9ab4b78231f868ab494224a9a86296cac574
SHA256:c852cf937cc22c5cde722eed5d63c3f87f17ff43c4f4b24a5535c80dc3ccdf71
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\iga64.dll
MD5: 9de0cb27dcefdb91d0c0b41bdd31a393
SHA1: 3ae11a011e9e09716e84c6e047d9da4edb575e54
SHA256:14eb07f52dd53b8952dcaa08368d21a62c977d0161d6bd411cea5c9dead90235
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igc32.dll
MD5: b852122e40d77203c5445d94cc0b9904
SHA1: 59ab11a04728534750ca0199b1d65e3096a0c50f
SHA256:2c5f61e9560c4bf68b5aaf76d7c2de77d4fa2a4ab83d8a939d32415aee1ee0e8
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igc64.dll
MD5: 4718e5afe0adf500040567aed5220402
SHA1: cae467b6f9def76b7ccaaae333450922fe6b0809
SHA256:78d4d815353263279a5ac9e1185eed6f11e056bad6acf8f830e40c38e313fb3a
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igd10iumd32.dll
MD5: 2e5e60f7e8d136728e95ee77438ca9d0
SHA1: 9ce554bf809d12081cedaef6b8965b8329d09000
SHA256:d5612da32e416fc0f70ab9f61d38cfee8b3b300502da2efd5f95f7e70c3caf5a
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igd10iumd64.dll
MD5: 427405b6fffb55ef0130634e565afb63
SHA1: 78679569c41594cbd6f12c68cec3e817e189f3fb
SHA256:6073143f21143b44f430a0837b2a97f594230d97eb0489041e25753d4348b8fa
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igd11dxva32.dll
MD5: 4b46aba21f51819434b2c3e41344c61d
SHA1: 2aae4879f3d7b82de48d8b1008e42cd85c2d8a8f
SHA256:1f62d6b57c9360f9b6ad5c2ca0afe99e6f0e9e97e7d90106127b2734a9fe89c5
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igd11dxva64.dll
MD5: dcb81b49d0576defe338fd766212aa43
SHA1: 6a3ee658d40c72700183269b306a313c78178373
SHA256:b557002895db9d8bdd99b7cdf7a0ecfd43d8e0711fde8dc032bb3a700ffa5eb2
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igd12dxva32.dll
MD5: ed3437f42494715dcffbe31bb6896a58
SHA1: daefa1dcf4380ece291d40c5ab797b8e65b04b79
SHA256:da281e5f1dbc3cc82bf3909cfac55405e44179fbbdffa14ffc85f75eab339b6e
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igd12dxva64.dll
MD5: 391f1972b6fae655443d6b5e90a9063e
SHA1: 19420366a761d66ca913c36a7cffeae5cbbb5848
SHA256:1d12c3b800682195087fa2cab083fcede85b507503f6bcd89eb81d0629f220d4
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igd12umd32.dll
MD5: fb715da41a543b2887272ae35394ec81
SHA1: 17f5544f1cad48c089a9c8dd0290f8cb71c164bc
SHA256:907fa381b991ae6b1e17acd74f86c39c55b1779d9c4ee439a4de1ad1aa4a5a0a
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igd12umd64.dll
MD5: 2e969087f2ac12d20d547dc2e1ed873e
SHA1: eacc610f2f2b160632f352a95260af3d1885b535
SHA256:3ba8d3f27db96f8af45ba6c332bdcb0d9c688b7680ee3cecbe896bb46db5b3c5
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igd9dxva32.dll
MD5: 82429643c8785ad454dc67b1f4b2d5e8
SHA1: f692edde99c6a1e51df1fe1df7fd6ca0f2e9e4f6
SHA256:3e28b89643cd3771843dae3079cd8bc22b538cd4b428cde7f01cf84cc50f8fa9
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igd9dxva64.dll
MD5: 57f83af93727b6785bd2514d9081a795
SHA1: 5f456eb45e0e9a0a961fd75ab53facabad170f4a
SHA256:9ce175e968ef61d308b6008143dd518b6e0fc48db65545dcc3abab264aa061bd
File Path: C:\Windows\System32\igdDiag.dll
MD5: ff4ad7445d4ebd178cc64ab158deabd0
SHA1: c06b1c0b38b9da187e1f07f6aba6ba4cbe6e32b6
SHA256:736bcb00ada8263307485e4570f92bb3a62a35e8620c7de056d8ea98a32c7d65
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igdail32.dll
MD5: 37e72afb225fc4745c9fdc0fb5364927
SHA1: 5955761c6da292419d5689c7a751d1b59ac3c4b4
SHA256:b087c10b630d4729623dc98b278824fe80238eb2ed61fdf89bba60f3c0b91ad6
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igdail64.dll
MD5: 92e73c159a0394df1fe7a4139394f03a
SHA1: 2042838339dcebedb01b7485440d7d5a9a5be7b1
SHA256:ab0f854545e42437f80beadf83c5670e29cd3952d5a7315d1b7c5af55ea9a1f6
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igdde32.dll
MD5: 1da8d7cf419b05549b4b115d15c3b2ab
SHA1: 4dd699fba00ee2bb3628c0a39055418fe89180b2
SHA256:523f4f21cfa25a166dd58f3c9ea4836942fdae199fc91753a21bef34f6f7b494
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igdde64.dll
MD5: 759d50c107f3f8192c47044583c1dcb6
SHA1: 53240828d7515ab3219fbf82dad054c526101e65
SHA256:c29d3d97e5ee3f6e3484421408de4cfc596a4a963d488e2b5a24c2f2811a8117
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igdext32.dll
MD5: 6d0a83eab7e5525b33adf71c1b5a54d2
SHA1: c06d4754a940bf23fccdff2400e28f05c4e2e180
SHA256:686cce4ca75f2c33719b29487223dc09d053959c9118628b9eeef81bce884b28
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igdext64.dll
MD5: d7fbd13242dc63520f0b1734b6de0b3b
SHA1: aad1ec535973ce6c632e8683c36cdbae96426672
SHA256:dc01e2560b1f6957ae9fefcaf6b612ec5ef747894947ff9daa992da88044c1b4
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igdfcl32.dll
MD5: c2b650e9b0d98fe5794916f9fa34c6b1
SHA1: 403ad96c79d7eba217e7555f85ded417320229bc
SHA256:81844b6ea401eb9a2dd66591d4b50d1aedd01581c190da1cc03cb0ab2daec7ed
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igdfcl64.dll
MD5: 6bacc0ee3af7dbe4712d5f7fd8501a4a
SHA1: 47309b469bc9a638b69d218a5b68f091aed66c0d
SHA256:8bd5ce0886388e09dd769e82b1d6b7b45531e6748879b015fbda126ca8490ee2
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igdgmm32.dll
MD5: 5b0a249d17e85ffc251f4eb323fabd8a
SHA1: 5c00a2d2563dba03b4af628503377d28ce422ea4
SHA256:d99dd39c30076e8ebec5882b4823b129c9dbab1dd1c073364d47402bda6b07fa
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igdgmm64.dll
MD5: 40293ab90e8d772cc6d12eac4d71b7f8
SHA1: b0eceb60fecaa4d3d0ad13df1b6afeb458632dbe
SHA256:307868ca323857beb0b771da185346e9367e24baf9920540fc305b158357eecb
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igdinfo32.dll
MD5: 55f7f9acb7a5e9a4752902b508934a20
SHA1: 660a675736714379f5fd022c90d429f4d1ff52b6
SHA256:70b30f030bcf9e5a38c44af1770e92bd273c716b0ec00feff2c481fc1bb46ab7
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igdinfo64.dll
MD5: f2bf62cf4c5685adbcca94995792a906
SHA1: 5f2a1630dc98251aa8a43ee0d8b772f49915a230
SHA256:a9422934c2557d902f6422d2b24061449e60ea624e333765222887fc5a9ad1fe
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igdmd32.dll
MD5: 95ababa239a17f0cade782f8c7d103bb
SHA1: abcfaf26955c76f484a6580b511c59afb22d7907
SHA256:a6515ae83fc87efb8a96680979d9c50b05b616464c41008fcd1054892c85335e
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igdmd64.dll
MD5: 0dd691cdedd96dc8d5172580d0b5b970
SHA1: ec0c6aceb35164816cf57a458b7d90809c792dfe
SHA256:a4dc0abf6ff8a0fbf231e3ce4f61bfc49bc6165ab67745c2887035b40b1def9d
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igdml32.dll
MD5: 6d2a615e22873ac54a5667ae726a2110
SHA1: 30191fef611ca6be42c66dadfe42b9cca8c5eac6
SHA256:42cd74dc7c646cb771b361f5193e2a02e59d022f660335c5d6f6a4aa541f284d
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igdml64.dll
MD5: dc601e9b87fc5034a7ea1928cdafa499
SHA1: 9061497bd12396d0db21ba196e84b3c6b5c93075
SHA256:942c8348e246dc655baba9116221bd46063a45571d19cf822796dc737d184b9a
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igdrcl32.dll
MD5: f054a0d4e85aeaa4bb332ac970130fbb
SHA1: 59be785120f3349025861680fb3cdcf3159f468c
SHA256:d4d615b8e43df5f604d24ff6e487b3f10f19bf3ba0187fb89190209c2b04ca4c
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igdrcl64.dll
MD5: 8da03dfed73ff568b523c8a285bc1774
SHA1: 0b4e968ceaa79577dfc213d748b7d74e3412c38c
SHA256:d330634eb57abf2137c3b41d7c5e790d905b911c887233cd6087beb94e19d811
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igdumdim32.dll
MD5: 6100e7f8acde25bb53e38611f7078305
SHA1: 591eba50d66b94861a078307c906902269e87c49
SHA256:c0d95bb1f58f7ff9f540f1b5a2976cac1983bd7b427cd586f8038a7a86e0a527
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igdumdim64.dll
MD5: 3a9f6458685b0005dd7492b69caaee8d
SHA1: a5f5b7c2dd3cb46074501376845ef13a96d5c6eb
SHA256:6e71958c8181c2f369fc855e32b08ae0c7b770cd7624a3fc141183770765cd7e
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igfx11cmrt32.dll
MD5: 49d9810836bb599376ad142a0cf4f29d
SHA1: a2cd59d32a05f4556fe1d79ed94b90788fc3a92c
SHA256:fcb708816b734040dc25119fe8260211ed52bedcf5ef9e29554f0cc8679b8f76
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igfx11cmrt64.dll
MD5: 3107a7869805d1c95da258b2eb2e25b1
SHA1: 7213a39b43ee29deb5b538d402f5042f20930f3c
SHA256:afaf037a02a4631ab2ec692f2d635eb66de8f3fcd6a04eb712a736ffc2af5388
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_0d8dab4470c5524b\igfxCUIService.exe
MD5: 3f424d3926ec436f139fa9dfd38d1afe
SHA1: cc733cfd6dd5bf66b075da2b34328a243afb73e1
SHA256:0273791555d8d431f20747c35d973be461205ad4f830e52d5c8a083addac69a0
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_7208949846a9b9dc\igfxCUIService.exe
MD5: c2dc1aa10fbcb031c60287da43cdd81d
SHA1: f7cd04ff2c6c40fe164b3a81f372356ce85675f2
SHA256:beafe05113585ff9aa1a8fd44c18f26975f4f23e13baa4950888afb530530b95
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_d2a0453c62b3b51a\igfxCUIService.exe
MD5: 394bcd20810bd02ca2d50d0e50ed35a0
SHA1: 75ad55cfd51196b88e32c4b1206530df844ee648
SHA256:6ec5c2c067035989a8409badfa4de69c68e5434d1d73530085652e7c647820a7
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_0d8dab4470c5524b\igfxCUIServiceN.exe
MD5: 411bdd3b14b8c56d01b67d038cbd7a76
SHA1: e0657fb34cbca62b835c171952dddd02d21a4d5c
SHA256:cfa44e3d5e671bd8a15d2e0eccec96d9f5ba8c30779899d05f5b41dee8912c13
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_7208949846a9b9dc\igfxCUIServiceN.exe
MD5: 3d53bf6c5ebbfea775cd01972e2ef5dd
SHA1: a8327f82eaf52d208e1d3be4e92ff941c842f4d3
SHA256:9f4209592ebeef6d87e788026eed08eecc66c091d37c01899f0af4830cab2871
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_d2a0453c62b3b51a\igfxCUIServiceN.exe
MD5: 8840792bcc3494a44af55cf682138457
SHA1: 16793b870bd955f9a8549350b563c0a33e4e5b61
SHA256:ade6c4966ff6d493ee88c19ade4ec0f708ea101eb52c750771319e0917c88e34
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_0d8dab4470c5524b\igfxCUIServicePS.dll
MD5: 9b27fa0adb9e4caad76ddd447cf2191f
SHA1: 01355b88c8d59d097293489d6d6168e87453a1da
SHA256:0a391373023e312113ca13eb77c63b92b2e2ba2c9a94b00cf69db0d3e0c7fe30
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_7208949846a9b9dc\igfxCUIServicePS.dll
MD5: 22ccfd4086b17fd26502d4a49e90dd4b
SHA1: e5e52759f9fa6fa64ef6c04057d6855524fecd5c
SHA256:98a48decd0fceb70e4c132fc521344c42091c01c0fbb1558dc9f38386448665a
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_d2a0453c62b3b51a\igfxCUIServicePS.dll
MD5: ee696426dd30cbd4cc7eb45ad7e1727f
SHA1: 1eebd04dfc5b5c39680a1a2b52f7825455dae974
SHA256:4412ece038b1ed0c7b417b42368318776df4b5b599ca09f276a46069b17d52ca
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_0d8dab4470c5524b\igfxCUIServicePSN.dll
MD5: 34bb5de7849ea340c95bdfdb0bfd5cf9
SHA1: 5431a8618c2336949c8cf6042eca19f22b79940e
SHA256:cbee83c5f35f61fa0aa274be4df04c4c2267c2e796f1ffe34226d408f598746b
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_7208949846a9b9dc\igfxCUIServicePSN.dll
MD5: 7cb9911a64c84aba8b971865101a6788
SHA1: e46d3cfb35a56604329f024c40dc1a3b14996083
SHA256:3ed29010a24d37f78e81ad9fd031624301c6f9bc79fd9e42f31738bdbd54e11b
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_d2a0453c62b3b51a\igfxCUIServicePSN.dll
MD5: d3ea313c87059c8c8d605fa65bb19062
SHA1: 1eb5af9c3ffc81e798c6cf9f3e4ff36eb2b06b9f
SHA256:a21e4b63110e763511f617f2954244342c18eb98d1631afc53b1cdac83b1e304
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_0d8dab4470c5524b\igfxDH.dll
MD5: 41bf280b752dae9be0633e1a37f8489a
SHA1: a0ad5d9e10063176f501b23534486c66b30f477f
SHA256:2bd7acab2ad6c96f414640ac9a963edc9f201240b0e0eec66fdeca419a1c6d1a
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_7208949846a9b9dc\igfxDH.dll
MD5: 439201d2ed3729eb108d82af22b43890
SHA1: 146c2aa6ae96f8328fff8d7c83d4d304d3b08dc6
SHA256:20880162b08ab8fb6593fda6c3b8a7be95366d2993030802da88dd6678e2e8cd
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_d2a0453c62b3b51a\igfxDH.dll
MD5: aafcedca56ea1441bf409cbd90cfea2f
SHA1: 1148536eeb67a052fdc6829deacfd6a730552977
SHA256:33d91bfb0cf2fc6bc39e025473c975270831669fe2e5bde6609fb4dbc7fa251d
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_0d8dab4470c5524b\igfxDHN.dll
MD5: 7cdb47b4e19ad76f314b6d4a820939c2
SHA1: 1920d5d6603d0e5fdba0ad7eafe83f3676d1ce3e
SHA256:afaa72b65026e43d42d595b7c2fb04c70385093525cb7fcb9e97074eea404eb8
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_7208949846a9b9dc\igfxDHN.dll
MD5: 4d3d74ffde2edae4d1b5475ab40034ed
SHA1: a1a9081282e743301783e25b5f9e5e80bce44353
SHA256:a7a54470c44e7e41af4a3c33b73fa520a45f8467489f072546fb3f776a92e06b
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_d2a0453c62b3b51a\igfxDHN.dll
MD5: a5283c33b99785923428b362f7b70c84
SHA1: ddb52f0f89d4977e240e94115f09e867e211b26d
SHA256:fa3837589c47f21c1a521271c166af4339348e92e4a916c1f3802db982c09eff
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_0d8dab4470c5524b\igfxDI.dll
MD5: fb99b85b9a52c23411c89c30f0138cf9
SHA1: 35281cd3cdc80aafc59008ad8d3d42b66392cbc9
SHA256:cbc3279c0f03a8d39419ec1eaccc7af929164144b0fb2e3ea441db6a3e8ae3ae
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_7208949846a9b9dc\igfxDI.dll
MD5: e6719a342227f91f2df74acbd45dbce6
SHA1: a657780888d3442dcde52b10c4996fb6e1b27480
SHA256:d6f3191a3324cc4a31160ab16da4c59ed3f256ce7df6ed2a0d3f7616306bf909
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_d2a0453c62b3b51a\igfxDI.dll
MD5: 802331ef38181550a95dbfd51b4ee947
SHA1: e5b4fa19856815c7faea355e50ed8bf5e79180dc
SHA256:04748a622fff1722e46c780134b0beef3cb883de5410d7de36781d8a8582b2e7
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_0d8dab4470c5524b\igfxDIN.dll
MD5: fa3089f64f4a05d931950fdb165eae7f
SHA1: c200243982fcf1e1ebe561aca2e684c0c384ee33
SHA256:3d3a9047f1b3507e368f6d8a075024ff0cfa4d91db730f0edec542b883c469d8
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_7208949846a9b9dc\igfxDIN.dll
MD5: d801b609bed4b97fe6a5486650ce946d
SHA1: 33f84fa1c583d372cd9320e6a0cc46309672a790
SHA256:0c03254b4786246757bace65c7799aa5f5b70cb0c6ef19fa40da19f61a3ff644
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_d2a0453c62b3b51a\igfxDIN.dll
MD5: df15512166dda411dc5da75d885d6d38
SHA1: 2bde64d2c8ba69cff18de4172d3e62e5c1e80bdd
SHA256:59b4fe6b642cc04418a27567ee0998d00a5744fe7eac8c082bfc4ba2f7fb5b4b
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_0d8dab4470c5524b\igfxEM.exe
MD5: 58310f1c5c1723a10986fdbd8b6d6fe0
SHA1: 7e456537f5c2917cfd3b1ed95a42aa8090401b8d
SHA256:a7989cf7271ee1aaba098aef5ea26461065269ee1bffe10afe5ec8fd02dd98ce
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_7208949846a9b9dc\igfxEM.exe
MD5: e36f01bedf596623afe7bffe70447660
SHA1: dc79ba5282c9c8d5c04f7cdb31063724c7b460a0
SHA256:32130aaa7b63fb30b22f4a26c668791861ddc4f4131ce24a33725bff77ad4a6e
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_d2a0453c62b3b51a\igfxEM.exe
MD5: 7f2a5c9d06f9eabbf859a71ea89685e0
SHA1: cd6be65bb9dddb6ec663fa49e4ef8b850b24654e
SHA256:9e223f7dc839881c8b1370707290f9c4411ed3742decb0a8808df35062d871d0
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_0d8dab4470c5524b\igfxEMN.exe
MD5: baad7efe7c058969da6d36b5bc71f7b8
SHA1: 24198de77dd72bc709cf7eab01b7bfc21ed380af
SHA256:0309aefe37b641dbe30506287f4ee499e9a2f517259804593e6faeb31a46375b
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_7208949846a9b9dc\igfxEMN.exe
MD5: 3a715ec7b8bff8a8c6bb893ba1ea13ba
SHA1: bb97101601c6c32e96d9e59f2a405d6f8ec3474a
SHA256:30ac4d0abfcef18036965d5eb7bada4ba6c0f14479c23c4e27e2ac5c2df66a54
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_d2a0453c62b3b51a\igfxEMN.exe
MD5: 8ca4624506bda640954f8820a66b1bf6
SHA1: 74246bd0661dc8832d6bfe5911428c756adab91b
SHA256:fabe2f8935f2ab104a1139faf5f65e0fb31a624a91480cf5c8b83b1449063606
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_0d8dab4470c5524b\igfxLHM.dll
MD5: 40a2baa3e5db673e56e3d968bed3dfcb
SHA1: 712936a7c57e9cb6ef3279b310dd85187891f783
SHA256:3677ad5df645b1d833b3c0920f2b929a87374f559f1988ae74b2c3d504e592da
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_7208949846a9b9dc\igfxLHM.dll
MD5: c1a531e446318a696895f59318233a82
SHA1: 5496535f803954d171e6dbc404187fa7c758068b
SHA256:0b026b035c928eb0817d562c2e1d7727b1eb8ee93cedd8ed999f71d0ed2cfad6
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_d2a0453c62b3b51a\igfxLHM.dll
MD5: ee886d2a63e62a846e58d31a3eb13294
SHA1: dbe5fff926fbcc9abe79d6c928b395022cc2d21e
SHA256:83ba430cdd9b85da9db4885cc72475102034dfbbfd922b5ff61271f3136c98b7
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_0d8dab4470c5524b\igfxSDK.exe
MD5: d0236b00f45d3a6df29cff1ba45a7914
SHA1: 2343d9fd7562d6c32e6b627e04584c43e04f53c6
SHA256:a8c90cae0a62f578a61e4a7f9a6c7928119d85616eadc5efb1d9f1503432df19
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_7208949846a9b9dc\igfxSDK.exe
MD5: 3ba005fb2faca012ec79eb0ba5c11dd1
SHA1: 67badc3dbe0fc9e7506ddf86985ba74adbae592d
SHA256:91d0c843e7d2075436273a88100710279e4d9d3db4bc71b0461348df1ec0c6fc
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_d2a0453c62b3b51a\igfxSDK.exe
MD5: b64256cfa9d70af4b5036ef71b38b805
SHA1: f34496e72a096e3f898244ee213657ed15d36e58
SHA256:bd243e6cc54f136637ed9990bd2f34681aba344ae73a764be626aad50ff5c996
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_0d8dab4470c5524b\igfxSDKLib.dll
MD5: 9a9b2b0ea23565d41ed31b99b71fb569
SHA1: 49ba009d57c2261a5f1dd34bb80c0957cb59acec
SHA256:fc2a3603b676dda0328f7c24232acd7957c20fe2aee35d0216bbd8f612fe0648
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igfxcmrt32.dll
MD5: 5176fb276268d713d4c36ba210869c89
SHA1: 025cff0fff519a502a5a07c0cb5fd996cb431c01
SHA256:96e638d6c456d86938be548dd1c8879f7df2621ff7c7b220294e9043b2348e0c
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igfxcmrt64.dll
MD5: c4337a3515eab18a3a46d9ae5f60cd59
SHA1: 2639256d0ea7a141ec113fede25aa6ea55c71460
SHA256:abf720583b972bacc793a62a6de0234bf33da876a391a60c09f848b4b9e43356
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_0d8dab4470c5524b\igfxexps.dll
MD5: 1c6830c57532c6b3db5714102f9f364d
SHA1: 0f5cb99a391e4cc87ec1e821e3d86bd00fb20c7b
SHA256:916e9b624a29d1ec01e6676950c5926d848f5c893145bb0806f2d3dbf5438047
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_7208949846a9b9dc\igfxexps.dll
MD5: 048adab6e5f42f8bb443931e7605f0ac
SHA1: 864ea0d49186a51c978d6a3940fdb59192f30ab4
SHA256:cf3428fa39c39cc1c7c958ff0a60ea590aeb29aa5dfd0ad2f275cd989a3b8e36
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_d2a0453c62b3b51a\igfxexps.dll
MD5: 1d7221c9212cdaac8fc7be3a539e4f33
SHA1: d066b9a24bb54ddc14523a7ef8f37f97db2a5f8b
SHA256:ff952be7523b4477883095d8ea6c105471afe6820a4945a9eabe2b6259bab7a4
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_0d8dab4470c5524b\igfxexps32.dll
MD5: 575b8269daaaee720217c9f3f364b52d
SHA1: edb2c1f20f17e9ff5cca53baec88e52164f16e4a
SHA256:28b34229f8a8d50d8313433b32be132fbf483719a0ea420b43b7ce8665222f3b
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_7208949846a9b9dc\igfxexps32.dll
MD5: 923ef72136528065d3fedcbb4cb25842
SHA1: d7b632c3a6e56b6626772b00a61dd08d38c59b10
SHA256:1bfead5afae35a0106c5046579678e58f4893e180030100c2eb79cf950531855
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_d2a0453c62b3b51a\igfxexps32.dll
MD5: b7e87b8eda6feffc55d2eba2bfd34ed0
SHA1: 5a2597e0f58f152c4ad04631033e6a636d7376a6
SHA256:e1657cc544f718f354ea8d5e68ab85af0e19786b85e722865f464a260bed2783
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_0d8dab4470c5524b\igfxext.exe
MD5: d3e0b4abf964975355b98c9eb6a3a4ed
SHA1: fe4ac76b67c062f87227fa1ae91354d66dbf8079
SHA256:c81ecb555f40f7e9ec759debb9a54a8afa6d49fc38b254845f54d2ece2b6c6b2
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_7208949846a9b9dc\igfxext.exe
MD5: 48af3ed9972e63df05867f35ee4d70ec
SHA1: 6432406aed1ddb47ffcc6dbd84ce74e34a3fb447
SHA256:6cc36aa74d968d68cae39e8aaf1396184d7b2afaae2e1678f21f1f55bb48e5df
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_d2a0453c62b3b51a\igfxext.exe
MD5: f4fe524a3af0415640359b2bfd7f386f
SHA1: e21f25fe5782fd13c45a99b68fe3935719afd64b
SHA256:d5201bf4d2b24805bf0401a821c006edd1f75dd916019f7c159a5c79d012bc5d
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_0d8dab4470c5524b\igfxextN.exe
MD5: 3e3d5df4d2caa526ddad1da2e716aa4d
SHA1: d16fb7e22f63fd2d77bf508221d06a0832ac3a11
SHA256:0eff729f761cd174d6746b5c6bd96ded828837c0e5b2b0b37a8f21dfefe8070e
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_7208949846a9b9dc\igfxextN.exe
MD5: 1b17ae645fc8d30a57587d8c3a4b1265
SHA1: f186fdf437fc2375f672cd5502e48792b27c7330
SHA256:c354913f3b80a5c3fa995b418e0d0a3a16b5745cc1402950cb032ce2521b9450
File Path: C:\Windows\System32\DriverStore\FileRepository\cui_dch.inf_amd64_d2a0453c62b3b51a\igfxextN.exe
MD5: 665428b4a7e18992e71889413032a8c9
SHA1: 6d308b08ff5277e232c0a9b410fe4fd6d9e2b677
SHA256:eaf137e2b6240858750b31827c643f69430b0632b42d30d275db668a4b884d06
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igvk32.dll
MD5: 9c74afa235c879553aa65ea5f34a3c71
SHA1: 2ede1446b41a90452ceaecded8594383315b290a
SHA256:705f2dff109b6f05e89ffae3a681455773a32fde9921cb66afeb2b20b9ed6d17
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igvk64.dll
MD5: 29a4ee32e8ee3fa2767283c2706797e1
SHA1: fd5498810bc65f096fe108708ccbef558375f678
SHA256:32a1037b470d90c8027bf0a87724d87bc0458a620a25f8655c5f56295634ac46
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igxelpicd32.dll
MD5: 905da5f103c123d9933a497b7067c317
SHA1: de53510885a239ee0762e7e28e2ce30cf527c346
SHA256:e45252625f454912f3634d21e6aff8c7c7872619ef5f9ac728bf8592cddf630b
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\igxelpicd64.dll
MD5: e9261e038e8b5869409dc7ba15048788
SHA1: ee857e3961b45fe8062a78ca9e2427dac78d9b37
SHA256:2c45f6d87cbfe2fef68955f3713fc77beb3f00e1ef0709e3c67440ebc9350f57
File Path: C:\Windows\System32\ihvrilproxy.dll
MD5: 536de5dfbb752a17789210732292a523
SHA1: 43c97cd9538eb20d6bd8134137b85e81cb6ab021
SHA256:5ea8005c06e7bedfa53c32a5486dec4b36e2ef4c39190a73927fefa01e9e6d22
File Path: C:\Windows\System32\migwiz\replacementmanifests\microsoft-windows-iis-rm\iismig.dll
MD5: 2e09f1794e1f4e33b72fb529e1f2f552
SHA1: b67a704ac103cb1820a375dfca30b7eccc99f908
SHA256:d824f84cd0c885e546842335b131a0cef67e236f2ddbf82617b927e55fada9df
File Path: C:\Windows\System32\imagehlp.dll
MD5: 75f0c1356bd7234ee70a3b661588985e
SHA1: 2436bd0d1fb34302f4187f6e8986159e7dd7dc24
SHA256:509ef25f9bac59ebf1c19ec141cb882e5c1a8cb61ac74a10a9f2bd43ed1f0585
File Path: C:\Windows\System32\imageres.dll
MD5: 26cf6d10542393d74703ed8c3cad0988
SHA1: 689b63fee5aa3cb832f0be054ab08eacaa758b05
SHA256:76b979b53f1f901db4cddc093100fa5b0479c6e428f6dfe1d1e1175eda8ec710
File Path: C:\Windows\System32\imagesp1.dll
MD5: 08b119c2db5ecd2b0b6f502487f3688b
SHA1: def03a82ee71cf4727a8ba44284b676beca733a9
SHA256:494b5be61b561db063677b15fa0093efde12edb921fb2b6fde8db9c50c5c9f47
File Path: C:\Windows\System32\imapi.dll
MD5: 74562db828886a0b3a36726f41b3958c
SHA1: 49640442400c680f1882bafcffcd8a35299dd48d
SHA256:686bc92b396c88f4841bcb202edfe3ab829ae9a26beb3152b3db4a09188bcb63
File Path: C:\Windows\System32\imapi2.dll
MD5: fe80ba014d0411442d2c0005843c2c28
SHA1: 27aa22f7413be8bedced53e4b5e3c3bf48533939
SHA256:0e68614558767672cf66a01d284b5f9360f22cab29ea75e2bd385ed75866dc82
File Path: C:\Windows\System32\imapi2fs.dll
MD5: 320fe1c2d204d31ca971866936e45be7
SHA1: c10f630ea6cc2e2548f4405f4f3122745f4a9ad1
SHA256:9d6142f338128aa9f48b4cb8f86b104ebb8ef6c6d0c4aed27687d309647d3c43
File Path: C:\Windows\System32\IME\SHARED\imecfm.dll
MD5: 3e7183e29c6032cf1a2e5c0387ffc325
SHA1: 0a8cf41ef02a72450ed42ec22fbcc913ad2f87c8
SHA256:aae63fa14effee2b35263475fad9dd808e75899dc690179220aaef25dc861259
File Path: C:\Windows\System32\IME\SHARED\imecfmps.dll
MD5: a3b50cbcf3aa04275ca36968d4f04f60
SHA1: 94f1e547d1d91e8a5846142f3ced81e73cd34e47
SHA256:8da98c60d7b8ea026d9f16ba5ffea24e09c9629473121b29c237c7860fc74c75
File Path: C:\Windows\System32\IME\SHARED\imecfmui.exe
MD5: 009e4e4d7ece61c3d054840919cba1a2
SHA1: 006ebeefee7cea8587031f2ad645363eeb0af9c5
SHA256:868b631aa3dcefdc3cc8eba1dfe09ac6ac41682b52c367c96fa0c2baf28e89ac
File Path: C:\Windows\System32\imgutil.dll
MD5: 7712b21a1da1e90d3ddee47687d86054
SHA1: 55110ea6e1fc1820f9ca00cdd644bdb2194fef7c
SHA256:e5ff846fe9c37f4ebb13d1f27d0189d59314986e3cd6c5e056c7186a87ba7d9a
File Path: C:\Windows\System32\IME\IMEJP\imjpcus.dll
MD5: a6d293d62da687db9c287390bb1b635f
SHA1: 1cff2b7e0233c43c243f5374a88dd72354368746
SHA256:fc4148f4949374a1a0aac83f50cc99d4e97e2489de522a9d8ca19733ca1221a0
File Path: C:\Windows\System32\migration\imjpmig.dll
MD5: 76fe1a0f5fed00d61718918552d69b34
SHA1: 3f0f5c173cb837d7acb583af7238bba6c9c43550
SHA256:3284102adb6de39aa9ff93f6838208106708a06b067c896bd9187539042c928b
File Path: C:\Windows\System32\migwiz\dlmanifests\Microsoft-Windows-TextServicesFramework-Migration-DL\imjpmig.dll
MD5: b2f223f20bdf383be9d6ff9704746606
SHA1: f7b0c3b12f3bd709fc3c374b1a49265fc89e30f0
SHA256:fc3eafd1b1b65b4f6461a98fcf9e5a7edde835ffff23314fe60d169f949be88f
File Path: C:\Windows\System32\IME\IMEJP\APPLETS\imjpskey.DLL
MD5: ef239af0947bf845760e8674a9c26af5
SHA1: 922ba2b1c89a3bcbb29b2011258806c29d9552a5
SHA256:733660d45f2c47ca59c867e0cffdc5d1ed36d04b9cc87c603aa079821509945d
File Path: C:\Windows\System32\IME\IMEJP\imjpuexc.exe
MD5: 6a16e56e3f5481edfeb12b7176bf2b75
SHA1: 14444d6b30cdf0737074c3f01dee0cd8fbb8ff42
SHA256:38a69895cffde8b7bb9b3d048cbc9decb7e321e3a6bf5ba41826c46f3890bc88
File Path: C:\Windows\System32\IME\IMEJP\imjputyc.dll
MD5: e7ae8787fd11d867dd37fa2589edc868
SHA1: 5a779db30d0e16712fec42e3eb44a39b643ca2c9
SHA256:847d74d4570d803a4922d66f9ad99748ad78a48daaadcac6c77d4cb1dda8634d
File Path: C:\Windows\System32\IME\IMEKR\imkrapi.dll
MD5: e54279384db93c97ef2a414a8872da91
SHA1: 6bad08ff5b3a07cbc5938faa1036c153c4abdc07
SHA256:03e1c4f805ce27cc6adb5cd8043fdf97f26cf822a7ef5cde9007d0d66bd98f45
File Path: C:\Windows\System32\IME\IMEKR\APPLETS\imkrcac.dll
MD5: fc2545474991df6b5674de5a48798e68
SHA1: bcfb4fe35d5b398e974537e4d5237ced38c17126
SHA256:4b37479bbb4df15781ca6be2f21ca9d317a91c864c0c14e197d355a8899a25e3
File Path: C:\Windows\System32\IME\IMEKR\DICTS\imkrhjd.dll
MD5: c8f3c12c1478a9a2ae938975f6d683c5
SHA1: 07bd0a381b2e7aa683b0372b789d071df965f5f4
SHA256:b7d4aa07b8f69201d6173e69db902ac6a14c90a0019d114c3ac70ec8c9923ec3
File Path: C:\Windows\System32\migration\imkrmig.dll
MD5: 685aa5d57009a81c76abee933a9a81d0
SHA1: 884efdd95660f5251ed37ac6492441bdf18a04bc
SHA256:2a352ed9d346b7d8bd9d1b1ac0f892389c40a0dad3decd2e4516d3b4bda9fee2
File Path: C:\Windows\System32\migwiz\dlmanifests\Microsoft-Windows-TextServicesFramework-Migration-DL\imkrmig.dll
MD5: ce4f4a0d99c04ba51b98897d4c5e1fb5
SHA1: 3afa6aac19ce700f74bc32f5ff1e0eb04ba9f7e2
SHA256:e98ab5171d5d947ba74e69d347c3fe1c0ebcc003a7ca2b8d75f06ca4859ac94a
File Path: C:\Windows\System32\IME\IMEKR\imkrotip.dll
MD5: 8db7f8547020e5e13e0c781c2f09971b
SHA1: b163e18b2835429359b9fecee6db857250aac87e
SHA256:98a9c6947a57f783f0f5bbdefa0c51f71824a0677e349f7821d4027ad2d04b03
File Path: C:\Windows\System32\IME\IMEKR\APPLETS\imkrskf.dll
MD5: 1cf471e73959f092fe11327793c7e6eb
SHA1: 6e24ecec77345a44cadac7c9c546315c0f98507c
SHA256:c69e2878e494c04c9b87ae9a288c0227963de426bd3b992568fe3031ffd3b7ea
File Path: C:\Windows\System32\IME\IMEKR\imkrtip.dll
MD5: d88f2fcba47222d2afe57d2d4978372e
SHA1: 654240b4760daceaf42d7e92c99fff81f036ef58
SHA256:262a0a43aa406b9005bce4737928809ffe0e10acff273646bcf51393930df429
File Path: C:\Windows\System32\IME\IMEKR\imkrudt.dll
MD5: adf0c05eb856047a0c8c301aac8384a5
SHA1: a00082436f4ed484fed2c26178ad2b88ba3aa508
SHA256:41417c6b3a7a38763a87230d4304c18b8dbe00f9fd2095c44da4988803f33e1d
File Path: C:\Windows\System32\imm32.dll
MD5: 193d2ccd28cdbb246ff4cd47361c2cbb
SHA1: ee58d02a3e847be829708ef2ef5e35e5ecdfa9c6
SHA256:de60bf11a8d3102a895535fdd843884ab244bbeeb0db09a819e5abfa39025d50
File Path: C:\Windows\System32\immersivetpmvscmgrsvr.exe
MD5: e2ab2935ab61e6478590d72a5a6b7467
SHA1: a76fb4f3a76a9c8dea1de95752caf7d2c279967d
SHA256:308649c9ffc24fa7f18cf189a24302845cc231bae4873425b91f7c919fa063ee
File Path: C:\Windows\System32\inetcomm.dll
MD5: ce36a6c7d8487da10179e84fd78bfdb5
SHA1: aa0ace4f450f63d2e6ed5defc2ccaf6554cb46cf
SHA256:4d7d7275e946299a85637ab62c6f8a96c69790a1c57c50afba1d53187d3ef669
File Path: C:\Windows\System32\inetmib1.dll
MD5: 51517dc7221d990e21295b74b218e757
SHA1: 7e134c2d86211d03f35f6d000791a951937a703d
SHA256:0d680c521c8b80fdadf82e16063eaa0e954d5665e85498885bd47a5953cc2441
File Path: C:\Windows\System32\inetpp.dll
MD5: 94f964f362d74af64fdf155ea3961f53
SHA1: 8120ae32c70a574791aa1586dbd2bcac4e3e04c4
SHA256:33b503a5d204525a5d856fb1885989159ab7e1f144b5a7e913d684109df1aab8
File Path: C:\Windows\System32\inetppui.dll
MD5: ce1c949f8f4ad577fe1c38ee900759dc
SHA1: 058447bebe9da15d63f1ee607c42d254eee5d517
SHA256:6a22bee3e8320b461d86ec6079819753d1009c410538843667849921b59bb82e
File Path: C:\Windows\System32\input.dll
MD5: 7f085c6978fc0550a8fd6edf7d8a4667
SHA1: a5860f5259c638632ac107269488f50c14a6b1d3
SHA256:16c6dc56708f8ad2b6ff5ae89096b2411ca0369944a0fac0fa4f385fa98a9446
File Path: C:\Windows\System32\inseng.dll
MD5: 2f2e47f7f28260d94c44d0ae7b992ce6
SHA1: 03565f0d82421a572a16880545182a450b947397
SHA256:f70e9222b05a3f7feec77e6d0329fd5491b8bfb48e3026e2e08762f98a898da0
File Path: C:\Windows\System32\intel_gfx_api-x64.dll
MD5: a1e67e81ff3716397e105489de87e582
SHA1: 6dc61b30de62268fa4da327b2096cae3f62c4df4
SHA256:48ae0562465ad98ba825e5d2cb8e5d81cb93d0ef2ff832614a879f0c7862feda
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\intel_gfx_api-x86.dll
MD5: 43f1f56fd038d25ed40b6f1660046659
SHA1: 98de34e07a7a661328466310f69b58d904de9b1c
SHA256:ffa094c09747673a31e86c6cf43696113bee561688d94eecde8753e427d3b430
File Path: C:\Windows\System32\internetmail.dll
MD5: 6ec97b5f5119b0729cb9d6cf4bdf309a
SHA1: b446a81c63bef5b754f1cf65f253bd2e09888016
SHA256:3f27c311cd981c6c3b2e36f6879ad57c2ffff4c716b7196cf8d0dbd524908aa6
File Path: C:\Windows\System32\invagent.dll
MD5: 86908c94b166df7fa2d2556e484224f4
SHA1: 4db6c45aab616a951a0314c248568484b1fb1750
SHA256:529aeb994a2b96d548bb6d744ef08a3291deb967188887c6f0e719dc5649fbe0
File Path: C:\Windows\System32\iologmsg.dll
MD5: 39f3f6991d8bde8854a35eaee28174c4
SHA1: 204b396412eeb02595a175dae700072c0836b51d
SHA256:b265cf7cd05d4553127745a779faad94338e7e5ac1b9042abc66c1c4b30950fc
File Path: C:\Windows\System32\iotstartup.exe
MD5: 929d17ed0c2b4f3d66604655030ded17
SHA1: 785581ed6d55e9c0e89e8f07e3cf4e2607dddaad
SHA256:63206d07530d8ea4154b20975ad7ca3e897131c5c0d05fc200ab1fd86331a146
File Path: C:\Windows\System32\ipconfig.exe
MD5: 62f170fb07fdbb79ceb7147101406eb8
SHA1: d9bbb4e4900ff03b0486fac32768170249dad82d
SHA256:53e000f5aa9b3a00934319db8080bb99cb323bf48fc628a64f75d7847c265606
File Path: C:\Windows\System32\iphlpsvc.dll
MD5: d932868de2628c9f5971d01cd7c75427
SHA1: f46997a9435d213158b7f7e59c304091501c0813
SHA256:cf7d7f7e554d74c890b71b136cf87da38b897f5c3956d2c8ab536a380d6867b3
File Path: C:\Windows\System32\wbem\ipmiprr.dll
MD5: 5ac8ccfc51034abd43f20914d4cabc61
SHA1: 7b3237ca050f0a8e3d6996cf1849cc73f1a6cb86
SHA256:976b7df871583beb96d1a06af0fbe4c495f2be6d6186a122ca7850f78eaa70dd
File Path: C:\Windows\System32\wbem\ipmiprv.dll
MD5: a36cbf8bf942254e9b95e72c40b542e9
SHA1: 098dd4af1935080f7854cc84e1d27e61d1990c2e
SHA256:d528fa678e6b34dd13154dc1501b4fe5592dda8e6ba8732bd3de17d2b2719b2c
File Path: C:\Windows\System32\ipnathlp.dll
MD5: e0e801ff975e16ff84c107340a764053
SHA1: dd48deab0fe5b189c7c9b77b3249fc747820f00f
SHA256:9a25433bdabcaa02bdfbd5631d9b52b4841aa7bf0ca3f47ee79309254dcce995
File Path: C:\Windows\System32\iprtprio.dll
MD5: ddb707b4f95573400773dd304d03c3de
SHA1: a6d967026a5efca359f3131dc187ab48f32b5aae
SHA256:9e256a2201b79b5278b7abd98cf26e7964b627ee177ba5e5ad0734b739bb1a98
File Path: C:\Windows\System32\iprtrmgr.dll
MD5: ccae3460c32585b2b23617255e380e31
SHA1: 9dfd30669270ff996af12e59d3c7b2346c7964fb
SHA256:f33764d48d27792758e24b2333cecb923d1fc18d665db9f02b5855223d1201ad
File Path: C:\Windows\System32\ipsecsnp.dll
MD5: 77ff0017d8f8ec039256cbaabf51afc7
SHA1: 4c32dd659c3b2b65ac027e4f5f02752b42205c4a
SHA256:b0fa8bf266b69c124368eced3cc9c93a683f67e7ce7a363a5edd0c1b649345eb
File Path: C:\Windows\System32\ipsmsnap.dll
MD5: e0da36f561936be3b692e5ca116a2eb5
SHA1: 5430b03bb831bda0d4acee2a5b55ac2eca60ab0d
SHA256:9c612f17031abc07d24352fb6bfbda685f1d32ce2308bec1c09035d1839cf85a
File Path: C:\Windows\System32\ipxlatcfg.dll
MD5: 77494e26b28465d2a09b9455f8a3b34e
SHA1: 29b1a69203de115dae267694b68e6cd5ceea79e1
SHA256:b778d4bc71a5f5cf687175ca53ac342e4740156d4b96e6e96d918bd46c2c1459
File Path: C:\Windows\System32\iri.dll
MD5: 17c611b170ef78885c8df913758d1bff
SHA1: 9a892db5df3d19e0683e509c088dbb4d30bd1ca8
SHA256:c802091cfce38e6706149aa7e642c01b53307754a4bafcf913f56a1220e5a090
File Path: C:\Windows\System32\iscsicli.exe
MD5: ddbd30ce54460991db3db3bb1439a1da
SHA1: 51f533a4b38d83f574b0467e9279b7a29c38fea7
SHA256:d4fac8a3e75eb0450de82516b2b2eaf3f282bb1fc98b4d5ef19d8ed57577f6fe
File Path: C:\Windows\System32\iscsicpl.dll
MD5: a2e6721d195c67de195f1aac0946c861
SHA1: 56b3a479a6dbbe6f384c4669191a81b59e14d5d4
SHA256:8c23e169a96a2d0b615b38ba3b49c2696a43e4c0c4798dd8771b76cfe891e702
File Path: C:\Windows\System32\iscsicpl.exe
MD5: 50930ff50d66e5f3b90cca7f09ded1c6
SHA1: 4d884bcaf78308f6d91c2a5d50633e6537c28de1
SHA256:e5e2f1673d1da42b134c35d74655cbeb7272686d52f65b5fb3c1fe2b2f75586e
File Path: C:\Windows\System32\iscsidsc.dll
MD5: 265141acf64e1d78ef594b5cd7fc966c
SHA1: dc5906b9a7a67f5c5335d114b5b4c49ef61a4ff0
SHA256:2e090cf29077ad5675866a42a61e6dbf7bd14f233b3645e3cd7cf9b048d269ff
File Path: C:\Windows\System32\iscsied.dll
MD5: 7cf933b00b65fe70c011f9be37b4a430
SHA1: 6357ff4b854496373c139e0bea75c8c5044b9dd6
SHA256:e08623a19b51cb4854630e9827496d06376aca8429c629622ba99219eaf3ab0b
File Path: C:\Windows\System32\iscsiexe.dll
MD5: aa5d11a7c86dde34f72a60c27783eba9
SHA1: 23e03a146eb90df66fefbf93d4b4c830a80230cc
SHA256:1fa42af6e3f9483f97f8d1c854b96fafe9722ee3e84b3f01cd2acf540a5c357e
File Path: C:\Windows\System32\iscsilog.dll
MD5: 8eef91838feca3e7905a05f15648b215
SHA1: 35af433e10f9c8eaf7251a32b52c279a317d8ea2
SHA256:4aa5d43d8fa15209dde134d6c3d14ffa0928abe7c083dc6d0b498787ca325951
File Path: C:\Windows\System32\iscsium.dll
MD5: c7c4be08a72f4a005cf698c7781307b2
SHA1: 0beed64f697fb35c1e08a8753d0f10b6f1979b97
SHA256:484034a22635cc7c389e440026e5a82c025703a4f56b999b5921f7e700b75c43
File Path: C:\Windows\System32\iscsiwmi.dll
MD5: 8225845a32fe2f892f9d5b75afbfb48e
SHA1: 460e4fccf342003685a5579a088c82b332d1ac76
SHA256:dbc052423a980ba56e5921f682fde90f9c7c9e605d5b90bbb6b6d271a3c42c49
File Path: C:\Windows\System32\iscsiwmiv2.dll
MD5: 88f090f2bd375b4ce65603f3cc925aa8
SHA1: 423f18ca4722d94b38927d79cf297388e61304c5
SHA256:3862fa711d2776289f790cb7fca504ecdf0b103fa3ec1ee83029fb33201a6b9a
File Path: C:\Windows\System32\isoburn.exe
MD5: 5335e512ae6c8d46dbab4bbb322cdfd2
SHA1: f6fa78a345212c14121b5d17f8038aacdea25929
SHA256:11fcfddebfc3272c2002c541e0e7cac273042dcc7c3871404e387a3a961a0ce4
File Path: C:\Windows\System32\itircl.dll
MD5: 52bb707f85ad78c3fcff77a35f7a22c6
SHA1: e0ee93f0daf43fe95e9c09cf5da7181341596047
SHA256:f10551d53762d5bea22a1e0d59e3600248076fd2dbd25f61da875c5e9e9228ad
File Path: C:\Windows\System32\itss.dll
MD5: e4b0e23406122db77593c1ea621bd446
SHA1: 0a89acf46ac2c7cc98d1cddc54fcd945cf689c73
SHA256:011624729f6d21aa3c4e0dbf7f069a05cf300b12424f5df6dc4dd130d4507e81
File Path: C:\Windows\System32\iuilp.dll
MD5: 902e985242d0534e72a27a3d92f13f93
SHA1: 1fb9d6da6e3c9901febf2adf4b2b26e67c78e381
SHA256:322cc7a05917ca880e1c4677e66be336e60341f02efe8c7aab7ba466f4abc772
File Path: C:\Windows\System32\iumbase.dll
MD5: 847a000a141109f610d596cef4347b8b
SHA1: ae53748e0b85937f0859c1c8af5bdad659760aca
SHA256:847ceb8034ec382ea1a889a4a33801df8f54f6d22bc8bd57ffc466c0ebee51f7
File Path: C:\Windows\System32\iumcrypt.dll
MD5: 900e30a3dc763f678bf065f57868a9c4
SHA1: 5aa35ded38594134fafc80b63874786f93d5fe49
SHA256:49636b1318c46c1a2c673fc03b4b8c9eaa14f8c022fc45fb0c9da52a467e3530
File Path: C:\Windows\System32\iumdll.dll
MD5: 6c5a92079bdf8b2a8f8b065369629c43
SHA1: 4b2051393fe7891a0f8d84dc025a3f30974212a0
SHA256:b1b2dc5ab5b98ba905ed62a9378ce5fb56774a5a839bddf3d365d05445e17092
File Path: C:\Windows\System32\iyuv_32.dll
MD5: 35256b0e5b3fff977bd48310d5552cf7
SHA1: aeb443fadcf643857efb429ae949d8643d2d30c1
SHA256:a7ad025ff011d215c7cb648f0231c4c5a40738c91f012fc4b29190e69680e03d
File Path: C:\Windows\System32\DriverStore\FileRepository\dal.inf_amd64_0b214be229a13e84\jhi_service.exe
MD5: 6e6653ac1f67919b37cbf5ee6568d108
SHA1: 6afd034e162cf19b38c0e7ab40d17804ee380096
SHA256:dfa37ff9d94fda7e7f1f4c3f649355b74c13e8abc762c41af531971322f93e45
File Path: C:\Windows\System32\DriverStore\FileRepository\dal.inf_amd64_5acc9ca73ae7cf4c\jhi_service.exe
MD5: 9ed45aab752ce20b5302a58440403682
SHA1: 70dbd4ddacef8a84322fc629b5580163a0e9d7c2
SHA256:2f822120640a9b5ebac02657ec20bab5c0943cd3873facd83f8a505d25b6bd56
File Path: C:\Windows\System32\joinproviderol.dll
MD5: 71d230f9f0d32e6229f4b93fbcf83253
SHA1: 9fe85c4f41a3f36d84ae2840a652220e9170eabd
SHA256:a57bfd16ff29aa3b744e52d7e9dce4bbe0a198b1f65566d1b2278203c0623e2c
File Path: C:\Windows\System32\joinutil.dll
MD5: 46644fa30a419564da4d5b7b3f6c5406
SHA1: c020ce11f3cd7d89c1bbf5e029c8b8ef1a1a290b
SHA256:018c48830b5a9dddfe1cef46e4fead01df45caf2e06ac3234cf4703a3d103a3e
File Path: C:\Windows\System32\jpndecoder.dll
MD5: fa7fad3724cf10e90da747dc41df0ed9
SHA1: d0289c9f687d32c9588067d0c5a0c7e7ae375849
SHA256:fab687cbd766faf4dff0096a7089a204a4456a01928f7d1cdfd28f396d47d25c
File Path: C:\Windows\System32\jpninputrouter.dll
MD5: 06b2f2ec3692ac1af9a6446d1a3ea023
SHA1: 3365a24e4a63049f6143bf602547ba01c7118d77
SHA256:060b0dc9f54cd30117819ea6885f72aadd6c08b5f8714f629e7ffa54a163531f
File Path: C:\Windows\System32\jpnranker.dll
MD5: 3d591f8fcefe9e9a2849c45fe6604926
SHA1: e840ed05a7aabc588fcb097f16094a35c8e9f197
SHA256:e9ad3a42111dfcf23a1469ff1eedf6d6c333b18c58215a61048d6975e337efe8
File Path: C:\Windows\System32\jscript.dll
MD5: e5c25e848bc105592a0945e8dd15e8f6
SHA1: 9142cb39bdc918a11d674236f3a990f279cf9c96
SHA256:39235275d48458eb716f6370c140e5e3d7c0cf1c993b670a45571264f9c4a7a0
File Path: C:\Windows\System32\jscript9.dll
MD5: 07d342e8ed2e523dd8beabf4230d0755
SHA1: 7a09c1102284d70bde11978da3a0933de0b3d0b9
SHA256:cca17d897e04abe5e1494dec91045256ea329aafe96212330aec75cfeb1792b6
File Path: C:\Windows\System32\jscript9diag.dll
MD5: ec37c77e181933ddcf2536071bbb11b2
SHA1: e0a3f4028377cd98b999dd1670484fabc709b030
SHA256:fc0b4c4186ea2ed94fd955f7468ac46adb5f0442cf504a3505ace43e52001698
File Path: C:\Windows\System32\jsproxy.dll
MD5: fc4ab2801cf47e2fcf92921a4dfe2625
SHA1: 8adbd78d714ea0909361e35f80131f67cb9c4730
SHA256:b303c5c4464362779a5118300e076c9648a6ea3b0cb347eda857fc6207313b80
File Path: C:\Windows\System32\kbd101.dll
MD5: 7ab9c569ee0fdb85dcbb64944bdcaa99
SHA1: e8f223e8647d9cf77515c286a385c773ac77edf2
SHA256:8e3ac6d16e53d61ac023cdf31fe908ad4520c76b738cee07795a2570cdb66c9d
File Path: C:\Windows\System32\kbd101a.dll
MD5: 70c9b237f59c0d074dcd8a2bde21f98c
SHA1: 39cb09e46a37b58a9ce026b1c2d707a34f0a56b7
SHA256:9ddc60f2a6aeb1f2ea5d1f76133cb1fea6e009b4554094efab35426efbe7f3e3
File Path: C:\Windows\System32\kbd101b.dll
MD5: fb34fa1c14d40ccca8718ffc5f6353b1
SHA1: 3af35e0e4cf80a947358fb56340d08d36eea4649
SHA256:d04d5f3af8170e12e94476000575fccfd022b97f7af57f4518f11ee217fee0d3
File Path: C:\Windows\System32\kbd101c.dll
MD5: d0e3f0d15d7f1963f968b2a8cfc57c6b
SHA1: 81fc457cd649a474d9a68d0528f18e0b5c7f3937
SHA256:43930a22fc02dd487e78624c9b1b2a8366d872da76139257cf7ee84a357317e1
File Path: C:\Windows\System32\kbd103.dll
MD5: 963ac554ef890b820546e57cad30a965
SHA1: 288b05a8d9d468c76c47f4729205f612dbbf4ecb
SHA256:19e697ca8e83961f41624c70e488510a9f7cf5bd434e149a6a0212f05cf9f24e
File Path: C:\Windows\System32\kbd106.dll
MD5: 109a93c64ec5e450b57e426f96d0433b
SHA1: e865bd21dc9e738d4b4ab993256a595d4c205943
SHA256:0656b31b73d81f4eb6843c72a6d6f2e43d70bae5127048f3dd63de38292daeb6
File Path: C:\Windows\System32\kbd106n.dll
MD5: 70f049c38f94e7c2ebaf5f0db4c31da3
SHA1: 33b297ba335a93f3e675eb89c47a293167c59665
SHA256:f9b1c349ae938d0c91ff80e4a817f6266dc0e4368913a4b9d7f941eea5107db5
File Path: C:\Windows\System32\kbdarmph.dll
MD5: edc488cadc3155607c374599f7c7b8ac
SHA1: b9c49480cc0424bac70074bb2f08c339e259932e
SHA256:30a73f927a7f6ee55e936583d5ab8cdf43e59a413d47cf6824aa10baf9fe482f
File Path: C:\Windows\System32\kbdarmty.dll
MD5: 2989aebd20a345578db9cead03d86562
SHA1: 9c058b0d4c04f800a26d8679a8ad45f85adef50e
SHA256:59e7de4a4f0a639f547f449630dfe6bebc52e2bc977ed3099a05a9b06feb8444
File Path: C:\Windows\System32\kbdax2.dll
MD5: 42444f5c818d956841e83faa05b0bcae
SHA1: ff1bc05714f018eb2c4c4af1c3d6d62a2794a145
SHA256:093238b8f36223c94ed2502b7a6b98f2f1c661f4abc16f1a57d47da8a7208cd6
File Path: C:\Windows\System32\kbdfar.dll
MD5: 2ac39d2dd5d9cd0b8ef2456926623a0a
SHA1: 6f958d626485474d23eaa7de1c861578d63382f2
SHA256:68431bf6b0313287e03546bbc6e5d6c113d433aa930f70343364b0ef3e9e38c0
File Path: C:\Windows\System32\kbdgeoer.dll
MD5: c398f1b26a6df17574d138ccefa0f26a
SHA1: 71f69abc1441691b1330c3cfd815230104bad9a0
SHA256:bdd92919abab30f76ac43a7b7b0b446f62eec7cf21f83960c69a70e195c3c658
File Path: C:\Windows\System32\kbdgeome.dll
MD5: 14ae66d422df8686ed9083885d722865
SHA1: d0698c259e1ab77c53919d3695eb7e86e2a45da0
SHA256:c6a0e8bbeef0553d1be4f6ae40996917c15d537ddb517fce6d9d0dc3a4c7ce35
File Path: C:\Windows\System32\kbdgeooa.dll
MD5: 11de972ad9c701f5dd5a103d1d4d4f62
SHA1: 70830552871c508d91da7f784ce296def3c32610
SHA256:ec7abeaadf4237492e257868a3c597b356bf12751335b191d8833e4fc485d7c5
File Path: C:\Windows\System32\kbdgeoqw.dll
MD5: 7fa313ac47e09f9b96b7b1b8c27b03d4
SHA1: bc2c443b0be6317784d5e814483de4d67380b89c
SHA256:00b82171d84a0d7531afe90ffdd95357f579d74d0f1c75395a3f03393a32138f
File Path: C:\Windows\System32\kbdhebl3.dll
MD5: d9fa4a32ea061308418d74d684701907
SHA1: c5d1e21c125d5f5fc88ade26e276c8d04cf034c4
SHA256:120e4a7ea7fa65bc7699d2ff48d05d99300554b3fc8129549018e58f068bfc26
File Path: C:\Windows\System32\kbdibm02.dll
MD5: 0509067a57326834a914060e93b77dd1
SHA1: 750f175305b82579f4a815d22e16f00c6f37d194
SHA256:4982fbe3656b1e609d79aeb127109f33df2c67fb0e531e4df80a708bbcc9f69a
File Path: C:\Windows\System32\kbdlisub.dll
MD5: 946eae90fae419a9d8b05e317a215b7f
SHA1: 96c70e1347756b297680d6ff7b1704a67012a8c4
SHA256:e6a20503cf50cd5dee0602d41c22a3efb3d1997c8c051b316cd0352d07b7869e
File Path: C:\Windows\System32\kbdlisus.dll
MD5: 427a6b7afefe695ddd08ac72c13bce5c
SHA1: 2ef95168a23e2c01a2a4fa6d7c0ea6b7a364a970
SHA256:e4cad6a26946a29f03c51bc82eca4777071b03afabda07d8971ec88ac1c92731
File Path: C:\Windows\System32\kbdlk41a.dll
MD5: 4a3b7f6a03fb7a6e3801e6009755b9c9
SHA1: 5cbcf18cfdd8ee11d59ecf11c2d795d8c4deee59
SHA256:dbdc5173dce5462977f96355ba44bf2e84896fce59fc83f11e25dcb539480544
File Path: C:\Windows\System32\kbdnec.dll
MD5: a02ac3333bc93f0ae236ecf134cf4a40
SHA1: 8c2421f810524134d6b178728bdd45f333c458a9
SHA256:b7a7b53bdae0b2232764f8de77a6e983dc10d595e1a86a3d9f8eb829f788b850
File Path: C:\Windows\System32\kbdnec95.dll
MD5: a722511713e23ce89bdd7e3a7c8150a6
SHA1: 40b38c63d8b083809aa6835412be31aa680f28e0
SHA256:36a3a7f0e44584f15b60177c2bda7a7497fbdb86f9c717406d7f021ef0f9be71
File Path: C:\Windows\System32\kbdnecat.dll
MD5: c7c5181427369a928996260bc1e36c74
SHA1: ff8899537f0b282822447e07c011f5ea8561df22
SHA256:664fbdf4f6ad652e928e39618cb959801297a20104e98a0454b0bb58b029f434
File Path: C:\Windows\System32\kbdnecnt.dll
MD5: 6f6cf88b3e5836403dd318aab0ed4625
SHA1: 9c24ec2bf15dbbd240465bfa2c80254a3f7dc174
SHA256:1c50de83d921b1ec0e1f35b17d2cdb56e90d66d8b74771ccae06bf1a983b041d
File Path: C:\Windows\System32\kbdnko.dll
MD5: 55fa7f058c61133e7ea3852e3d451aaa
SHA1: 7d7f763ab7c9ca7cb00eb5bfddb9c7a71ad3c596
SHA256:e35710ce41c7f7f74ba33870f425ce0334438eff0fbae504c417df0c85b201ba
File Path: C:\Windows\System32\kbdphags.dll
MD5: 6634f715638f189c81be07802be7f11c
SHA1: 01edcea7097e3cc5f44b4d498140e55fa208fccf
SHA256:fe21882c2e8be15dae2b58d4682b71dba497a796b529f562f160a12496521417
File Path: C:\Windows\System32\kd.dll
MD5: 8b1596c15c53ee3cd3c9b3cb17518195
SHA1: 502e5bbd4059be4d0368dc073e20f628411c0aab
SHA256:9785dabded2d3d2b18790ea7ab4b7460088e18cff7ad4d38692d26b529784ecd
File Path: C:\Windows\System32\kd_02_10df.dll
MD5: 20730e01c222f194be584a9cfcaceb6c
SHA1: 0a398f87eab93ace40b31bc1f14b8685c123b587
SHA256:e60aa93d7b26ddd808ebdaca36cf1ee450e8c5d2323aac1d69970a40add6a6e1
File Path: C:\Windows\System32\kd_02_10ec.dll
MD5: bf4dab70fe16def4ca17d4963bb2aedf
SHA1: 41f0aa155dd4baa700918a1dcfd89effba73698b
SHA256:d7c11fe81c5643d4f435c3651a3bd00d89ab5ec739f6929444648ad7fbfc53f5
File Path: C:\Windows\System32\kd_02_1137.dll
MD5: 5452f5f005a408d547ac0a49147adea1
SHA1: 2dea62f63df040dbbbd98886dddb9ba1a9d10f6f
SHA256:e71447802aadfe48c7a6b31c1bc8f4d30de926570761fa7ac857ec061b4a9943
File Path: C:\Windows\System32\kd_02_14e4.dll
MD5: ee65848894d16f17b4445fc80ad964a4
SHA1: 7f940d86a3f1f9710099d41e3d95bb99386a86db
SHA256:fea15e8b9cf5dca53823a88c3ae248e1ebb3e7a00c2eec4371ac59e8bcbe8e8f
File Path: C:\Windows\System32\kd_02_15b3.dll
MD5: b1990cf76c8192fc1517754ae8efa9a1
SHA1: 51111e408afb942e92e4aad6eb9df157073066ea
SHA256:a79fd8ffbdb496879005b838536d34b808c29ac04da5be5727497e45ec527ff2
File Path: C:\Windows\System32\kd_02_1969.dll
MD5: fec19c0b429b01e919bbcc2ffff26941
SHA1: 7050d5497cf2c6356c392757208afe9a4b3bf006
SHA256:5e7ceba39ab52bbdf4d3a4650df0b1496c24690596b598cc81a0276981c1580e
File Path: C:\Windows\System32\kd_02_19a2.dll
MD5: 9449bb3c61e96221d08674df07c6d21e
SHA1: bddc4aab47fa6c058d4347aae08693b1afd56ec7
SHA256:b38844b855e14be9e03161bf37c10f065db8cff35d7e292e7d3bbc27db667557
File Path: C:\Windows\System32\kd_02_1af4.dll
MD5: 56465534a416a2a7176dec7ecbbe3198
SHA1: 89b0d161d4705d8d2951b9df9ff087b9c4353055
SHA256:5e7353d810ed31f774eaba0db80898fbbd7efac47ae4e54d7232964213f88d35
File Path: C:\Windows\System32\kd_02_8086.dll
MD5: bf5fa5c003e04f93202ff467c57e19d6
SHA1: 83e9abe32781f7635930cf54fca82cbd1ec23f01
SHA256:17df32edaa7fa1e8ff8b84b78e42b266e02b8dde2722b542939c381a41ea2480
File Path: C:\Windows\System32\kd_07_1415.dll
MD5: d43d373a68c9d3ec87c2f3f84cc4ac60
SHA1: 5fba4fe22543fad551ab71999462caffb34f939f
SHA256:fc915d5ac4c21e53e7835336f97a40336a5515e09c84100818b49ef07c9ea1aa
File Path: C:\Windows\System32\kd_0C_8086.dll
MD5: f520af77eaba245749b03e853889d0ca
SHA1: cc7d46cf15de6bbbf78105643f20305ff2b43dea
SHA256:6013ef7f35ffa9c9aed794f88b23c20dea6e7a08d2ed204c523a7e94d96f2191
File Path: C:\Windows\System32\kdcom.dll
MD5: f6868db506d2e2c85533c14358a2d87f
SHA1: 4d3cf30dda8b34df4d8a5cbfcb727e08363d6284
SHA256:2716c4e9a2512f20fa66cdb9f8d23acdd2e63b19be524b070ba8edd6e1dbc40d
File Path: C:\Windows\System32\kdcpw.dll
MD5: 0f21ab1d90531e1f39f6e50b7ebf0695
SHA1: 0503d4b8d45c4f02a49806ecf357aae46184617f
SHA256:221e5eda19fb81925165e6b8a5efad7ed0679c7ccce4ec1e13e2cfacecb0f82e
File Path: C:\Windows\System32\kdhvcom.dll
MD5: 075af386ca5503ada81f0ba81d421ecd
SHA1: da3aae608c8c099596ec43367ecf467d811f407d
SHA256:49e8360c8bf2f2b700173c768a816615af829e761e29e6a9bf39a7b66f80fde1
File Path: C:\Windows\System32\kdnet.dll
MD5: de1ccfeb101fa4c6ac2a8a66947def30
SHA1: b54c47a0e7d106ff4148c180ecabe13d2f0d6992
SHA256:e4a324d333134e07c96db73df5bbb0638c5c8d98d0f976af7460968970c18b6a
File Path: C:\Windows\System32\kdnet_uart16550.dll
MD5: d40ea3753c56d0b8358f6bf213929371
SHA1: 667fd9aa248bc17cc3f07bd3abcb6b8cf595e920
SHA256:779180d65d71c94b8c92fb9336c0d0d922319dff94b4666cd1169dd73774123f
File Path: C:\Windows\System32\kdstub.dll
MD5: e843a86cfe9fca2f82db25588497e779
SHA1: a22be76024ce09731550a62ffba072cb351fba74
SHA256:91d91d935b11cc05701b7cf79b5ef4f8781fec45b5660e0a8055cb591fef4a90
File Path: C:\Windows\System32\kdusb.dll
MD5: 240b07d5416fcfc599c469507f3118ce
SHA1: 070e1cd1360f2c2b190f9ccdb683e81d681e042e
SHA256:10a222e7248b5c3f5cb8e005748641b6423eefe2ff16cfc92d7503fd429efcd5
File Path: C:\Windows\System32\keepaliveprovider.dll
MD5: a2e561609f147b6922dddde48948ab39
SHA1: 87647f39bc938640dedddc01325fa9e5cff63ee9
SHA256:254420df275eef1fa36f629640a7f0b163fd28f0813492bdcb937b4815ee94b4
File Path: C:\Windows\System32\kerberos.dll
MD5: 20a4374184a4c47e321a0ecfa219e358
SHA1: c5bda4428df1bcd20d74e4fc5ab38ac746457186
SHA256:67061b78a1e288dec74987ed5c870c6ee9a49da956177b5593e794e44ab7a7fd
File Path: C:\Windows\System32\kernel.appcore.dll
MD5: 7402b27bcb9d703a0603013f361fd773
SHA1: abfed6157a24b63055e3066c317a24213b08621f
SHA256:abff38d9efaca07602acc2a31775f8790ac720261842dbb6d7d9e1a46bba91f8
File Path: C:\Windows\System32\kernel32.dll
MD5: 77b8814884ba1ce656543c1bd53fb8b1
SHA1: 2948b6bf7188304e62b7ae76e0c980911d0820b0
SHA256:2e6ba282f487d785072033722f916cccf28b8250b3fd03cd72fe3cc712104e98
File Path: C:\Windows\System32\keyiso.dll
MD5: acfb7a53e00629980ef790a23ae2cdad
SHA1: 32d419a8c74f5bb26ae333885855a2a2da1155d5
SHA256:5b5d5c59d6a4bfeaec5a5d04576a481d0429c9f49923e55e6933c9f941e04520
File Path: C:\Windows\System32\keymgr.dll
MD5: b4c00899516850891e5173d646c4971e
SHA1: 195b62ad8ab8942fb4fefa9cd06796abfc550823
SHA256:6c0fca174fbf27013053111a16b9e2f26670720a27fafd97227e0ee5c2ac2153
File Path: C:\Windows\System32\klist.exe
MD5: 04d6765f99ff61642e85b9ed66363e71
SHA1: 0463e04bf4dbdea2cd5c5b0c3e656f7702b415c8
SHA256:9e9ffd30b491f98d246bb4a4fa83f656bf2afd2e5ae30ce6fbde79e5b6521f6d
File Path: C:\Windows\System32\ksetup.exe
MD5: 6fcf8d459b49a2706106dc78820eba72
SHA1: c3b8870e1b0864525ae2db1fa0c12daf333dd685
SHA256:0ff1f74164a47064650eb0a009595f1406e9b7e0975096dc6a53f8a600088dde
File Path: C:\Windows\System32\ksuser.dll
MD5: 0a8f948d4a63f5c70f9e0a6525e1b07e
SHA1: d0ef347ea60d1505aec3ab76bb692b7c11fd1166
SHA256:d284e0301679ecef1b763addd6bece589bb16e4b7d5c4fbe3d8684121e8f0b74
File Path: C:\Windows\System32\ktmutil.exe
MD5: c9d776b6a4bc22b5b9a0985ab9cd6101
SHA1: fc72d96df9d0e61a0458280290b27165258d735c
SHA256:81765113b2df32f13ef09fc96645c183f6064b27fcf4f3a3575088f016bbb5a5
File Path: C:\Windows\System32\ktmw32.dll
MD5: 2cee4caf0302fa8f6fe96462b5164e1f
SHA1: 194ec563acf89ed8d61c5a1abc8960af40a6bcd5
SHA256:493d8e66069d095270455916993939d5f4dbc79d77d5c78b631ca14d750e3002
File Path: C:\Windows\System32\l2gpstore.dll
MD5: a6efac832f6a9379f9cfb1ed0acf464e
SHA1: dc28bf528cdf128756fe12f3fb73c2888a27d78b
SHA256:6ee4e2407ea2ce7f2c47b5be0fe94fdea7954e587196fd3356ca78d2d77d5b7e
File Path: C:\Windows\System32\l2nacp.dll
MD5: 7e2291d1c816d067a1a588869cea5d5d
SHA1: 464e4391b864d47836de452849a5bfe82a36189e
SHA256:ac3709630ccead3ed3584564386418ae7557ba978251cdddd4266cc14ad0639e
File Path: C:\Windows\System32\label.exe
MD5: c62801f2fd980d444ec12455f83cf536
SHA1: 82f508b9caaf23f766935d03d43c28c787ae1b2b
SHA256:5b63cdaa6b386340186d48fca6687b51d666f4457c1d1228c4915bdd2917a315
File Path: C:\Windows\System32\laps.dll
MD5: 78efb4de27b5fcf90495423153409e39
SHA1: 3edca91c7bb396b5aa8b69e7907dd3d75a261d54
SHA256:6c5e7f9c2355c888bda435d2158dfaa3cdba9e4f76e9d60b62b0ce9409846c06
File Path: C:\Windows\System32\lapscsp.dll
MD5: f686c451a7280e7e5b6a48442fe4ce55
SHA1: d932d220f42abd7675491d99e9aa86b63b24d681
SHA256:aedf5e42b78a6cade350420edce97d7b7516826ccdb7068769b32c140c6e1366
Description:
Microsoft LAPS Powershell Commands
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\LAPS\lapspsh.dll
MD5: 699393b2ad0e83646a450044ceb0cb08
SHA1: 03659ca9ea1f54c5dc720e98070ef83146e883e8
SHA256:aa3f01d5b5acc035b6147df2a6e8e6dcf05dfd2b9fac1fa7a9b22f76fa93f619
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.CWE-354 Improper Validation of Integrity Check Value
Vulnerable Software & Versions: (show all)
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\LAPS\lapsutil.dll
MD5: d0fb01d8da619162ccbabbb719570367
SHA1: ff693996a43c7d999f77d6b65c93cd6dbe5c57cb
SHA256:be2490593f0e0a00ec55ca513f2a847ea26dda7332db955c4bf6936fe4a97145
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\le.signed.dll
MD5: f5f7c68dafcd341ae93f4d5501dd7829
SHA1: 8699d06086dbae2957a2b22d24b7121a4d76d26a
SHA256:77a293796bf44cfd39f3b416a9569ac1b424094b3e59eea41af772a3de7a92f6
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_d372a4ea3b959b1c\le.signed.dll
MD5: d0e02924036e6be8e4002dd77979d3af
SHA1: d7ca53c3a124488dfd8e818c76390de1a975f158
SHA256:bd54de95ecc9931981a74edbb0057b8a3a55c2dd3d20e3a8f4d7b92e277f7a74
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\le.signed.dll
MD5: 255fdaa728988c4fc84b86dc42d54641
SHA1: d539b876b70bd7313fdd0ecb266db918ab7c331a
SHA256:7b455eb7aa8435326a337d9931a722cbfea4c3287c3aa08db579ff6c33866e13
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\bundles\le_launch_service_bundle.dll
MD5: f1766c1143a9d8ace49ac71b4e2dcad1
SHA1: 46ac45961879c3c438a44407c85d70196bbc84cf
SHA256:75a6d25878828ecab112178227b0f207f3d9fdb67ee303f16d173a96f824748d
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_d372a4ea3b959b1c\bundles\le_launch_service_bundle.dll
MD5: 21167f1ac17fc77f76db99544478a28e
SHA1: ac9a176b29bfd7cfbf23f3721c8e9fcccfb207e2
SHA256:c41cb3f68f67d4d24f01bec7b5e0d2ab0ef6afaf39d542f7e0eacb674bda6014
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\bundles\le_launch_service_bundle.dll
MD5: e11ea5baebf4e0e64ccc3b8c8cbe665d
SHA1: f6de91c0a0d9c71cb3c491dbd47d84b7c7580f0e
SHA256:ab2b64537b6ba5679c989ff02f1c7404676ec3161d59037ced65795d7636e164
File Path: C:\Windows\System32\lfsvc.dll
MD5: a3ed491582818313a02039d5c54c4367
SHA1: bd288076ea6d1c111780cfa95dea286b0ca4b8bc
SHA256:39869b401952e3decf8b1d5d0fcb6f7df96cdb8296c2dff1b057c38a79707e45
File Path: C:\Windows\System32\DriverStore\FileRepository\iclsclient.inf_amd64_75ffca5eec865b4b\lib\libcrypto-1_1-x64.dll
MD5: 2400e1e475ae27580e0bb705b3eeedc5
SHA1: 557c24c2cecd12ba9f2790a8b60b2a910ab512f2
SHA256:b4633ce278ec84cb3a94644b3cdccd3cdac4341a91c128c074980decc52e1f04
File Path: C:\Windows\System32\DriverStore\FileRepository\iclsclient.inf_amd64_e936ad8266d026ce\lib\libcrypto-1_1-x64.dll
MD5: 96f2d54c6215747c7c33d2fbe2f0b0e5
SHA1: 5696431f86b1fa185a02ee55698a462beb905c7f
SHA256:510a10f5107605c40c5ed8d8b974b712c9b055275657f720c5c0f4312ab44535
File Path: C:\Windows\System32\libcrypto.dll
MD5: 14be6a1c21780d85ad3f1d09283c56da
SHA1: 40a6a79d690b38f9cefe92c0d0fa5cc0981b1965
SHA256:6aaab1aba85086b2b3c4cb5ab4b934af2d6bd0c1f7d6669e16fccdf8bd6ba0ea
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\libmfx32-gen.dll
MD5: c5121fae98fba928f6cd1ada606965de
SHA1: 9fe8537bd52c1a4edcb19b03af8e80dffff62808
SHA256:19aae28ecdad94316ad8a7d37a24a6b656a534230062c85dbbeb8c0399dd273b
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\libmfx64-gen.dll
MD5: c538217e12a16ec143e32c6bd068c300
SHA1: 6f6ca1ca6caabb05eeccf93d8a593d7aabdc3000
SHA256:6fcb2cf8a1556b50b537ab7f02f44cacfc7c63fe504f3d486473b5c40ceb09ba
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\libmfxhw32.dll
MD5: c407d7af7e8be9e02b245eb335acd32d
SHA1: 4412adced470720342af3fe155639ef9390342f4
SHA256:f2d58e828ffb486df1322e96680e60285fbdc53f9e68ae2928cd4232dc59af3f
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\libmfxhw64.dll
MD5: 0c6ac31dad50d7bbdd1f8346623a4f55
SHA1: 2ee892751be04335907c2b9ccd40d7889876245e
SHA256:4e5b5c108707612eb7f6f2d6112ea0af540654544986fe49bdcd1732c4d0832e
File Path: C:\Windows\System32\libmfxhw64.dll
MD5: 0008f5a8f6b825e2a13d79c2eaef513b
SHA1: 09046b7c7bd7812a8419705d79a7715711b993f6
SHA256:6a4f790c30eb8d70a848561e1c6e11883ffdad058770cd9e89a523f9c74a28f1
File Path: C:\Windows\System32\libomp140.x86_64.dll
MD5: ba90d3723f23b7349b0719d3582b2146
SHA1: 51f764920f4dbcaf2bc95910070e1b39ccf4ba29
SHA256:1c24afdcf8e56391af35c8b0780f179da0ed40f8149dd32fb3ab793690853c1f
File Path: C:\Windows\System32\libomp140d.x86_64.dll
MD5: 1beecf36eb81dc3f0f55a71ced7da89c
SHA1: 2ea7c434af70089220f965ae34117d319e4f0bfe
SHA256:41dc723ef45e866e5514846cebf576c8334df460a93407c6d08fd7b0f0471476
File Path: C:\Windows\System32\DriverStore\FileRepository\iclsclient.inf_amd64_75ffca5eec865b4b\lib\libssl-1_1-x64.dll
MD5: 52af6f8695e0f44c5d59f4f68e4da2dd
SHA1: 613f3f8f5681e8e5861ed7254d6e780197809630
SHA256:c1f81d0291435addd9de4468a4e7a2664fa51864f4c3f2e926d1f9102488ae43
File Path: C:\Windows\System32\DriverStore\FileRepository\iclsclient.inf_amd64_e936ad8266d026ce\lib\libssl-1_1-x64.dll
MD5: ebf61f79e2ba498026bfb9ef4a0069f0
SHA1: a4811e084dae8bd6bc976263c63402d7b64cfe1c
SHA256:6da463ee6f51eac76f8de17575c4425a88383750d61eecdaa37a8ce08df35af2
File Path: C:\Windows\System32\licensingdiag.exe
MD5: a865bf63720404ec8a486ca94e50a852
SHA1: 5d0fc88a3fb2eb481aab6a36c4b9c0588c572ae0
SHA256:a58635034c792261950afafadca6abd8eb37e8e836f7a6a7bd2a2913418c85f4
File Path: C:\Windows\System32\licmgr10.dll
MD5: 09cc07f1297a65efcfad160016a9dc4d
SHA1: b0a60d0fa231e04c984ad654bbbb875b8be4a932
SHA256:4d84ab45965fa0c73e4ebf93948732ca3f20ba12b9895dbb8a78c2cb8355df3e
File Path: C:\Windows\System32\linkinfo.dll
MD5: f56bc42ac0df66035f736ab668152e5b
SHA1: 344977d639d7000700488d8c6ebf413a7e5db258
SHA256:9da2815e7cbf32c2a3662c47e00d6066cabc7ef25891aaec7698e9d3024b13ef
File Path: C:\Windows\System32\lltdapi.dll
MD5: 9c144230b1142a95f5f53b4006ecada3
SHA1: 359e3b5b3eff91f9843396092604e45e440298ce
SHA256:864559c814c36834d492d3290968011a2e73532bdb6fc14cff86793bdbd1327f
File Path: C:\Windows\System32\lltdres.dll
MD5: aefa87d7f5ed0e36f47328e719828b4f
SHA1: 6d1b5499984837496307992aa4744fa7d630d900
SHA256:4f63d2ee31a9ef6c75a217822b97fddc489c29f263ba6bf935a480cfc82e9abc
File Path: C:\Windows\System32\lltdsvc.dll
MD5: 0ece02903d9e9aa6928f092fa21f7776
SHA1: a5574ec7d66d66f3087e2e9bfaae416afca75815
SHA256:288ef896d7304de9908fbc10c41b27a63839ee4486c3ca0b7b1188654e19b3ef
File Path: C:\Windows\System32\lmhsvc.dll
MD5: 4a501e9429650b678610abccad1d2609
SHA1: c582b10add7d6beda6ca3e312c90edb09bc9f1ad
SHA256:71f33fd997d36b8cfb7fd36397cb768aef1b6329b3882d445b72246621f3bd7e
File Path: C:\Windows\System32\loadperf.dll
MD5: 13695395779e515f8ecd2ab3245ca09f
SHA1: 3b59dadf5ed7a584a36b5eef0f11a2420fc50b8a
SHA256:3403c5162f4da78920ffcf82db31aaf8e7a20a108bb8720ca2ff087f72cd37c5
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\bundles\local_pseop_service_bundle.dll
MD5: 6cf4eb784cb9275158e99c4b5eb8625d
SHA1: 2dd7db82184ff1d1636125e2467c5e03b58056a1
SHA256:a0a41f2707f90ca4060d1303f9d92df50ca683169c2b938bef63898bebf2a8be
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_d372a4ea3b959b1c\bundles\local_pseop_service_bundle.dll
MD5: 86ae061211151afac7d5d69f84629e40
SHA1: ce6bda6256b90eee12f2ca896861f2f993c222dc
SHA256:f870dcecfee0c5587bb21fb78ac3d897c10cf465e75896619092effa266a52b1
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\bundles\local_pseop_service_bundle.dll
MD5: 67f017f2e6c602cd2d85cf31238a1b9e
SHA1: ac6f0d9d8c0473f2733346050d2b3d70269d042b
SHA256:ae0b597fcf6576c3ede054f30cffb468e0a01fe29e695e440aee0ecf13a1aa5a
File Path: C:\Windows\System32\localsec.dll
MD5: f1664fd92d6252c58aa0eaa2ccbf4e02
SHA1: f348d73af80d7e9be21b45912e702b6cb3fb16e6
SHA256:84d3c90662156f5e5bcfe2f13dd091f7595b38d0a2e235d09b6ea14834d35265
File Path: C:\Windows\System32\localspl.dll
MD5: 4df8c3c15d639b0e857543b40a962760
SHA1: 68cf6c2d472d691e28b88a1f4dd93d96303a6b20
SHA256:1fcd3873567dcd144c23c129432b62f1271a97a8e751062f9059551ee6ebd670
File Path: C:\Windows\System32\localui.dll
MD5: 19498e61a2db181e183fa95e66757815
SHA1: 58ea9844b44412f95160eb69d4032e2e29bde50c
SHA256:1b487b4a5162701f067c8342662d76b383a724aa0cc40b9f995bcae999190f0f
File Path: C:\Windows\System32\lodctr.exe
MD5: 38983af776238a60e94deef341353378
SHA1: c67bd43cd017e9285ca9bcba41ac3b922b163f26
SHA256:a68dc00716e93540692ce686922b1cf6d3f216fc9e0396c6d6b7291778dba6ed
File Path: C:\Windows\System32\logagent.exe
MD5: 038c8787e6c5c5cf68c8bd98da190502
SHA1: 61ff81116c946fe10acc05f4f368ea410a2a2264
SHA256:acbd363f725f86184e1a3329ba3a5fe11f869736286c2f9fec36d381d35be2f5
File Path: C:\Windows\System32\loghours.dll
MD5: 68c7b5b239764fca416293af770831a5
SHA1: 82fba1b387e006ce2aa241c84399badea9757e30
SHA256:b80f1f5f39e1171453e98cbc35b330fa3dda8e586d9d5a45808dcbd2d9983235
File Path: C:\Windows\System32\logman.exe
MD5: b30e4347f502f567e12b69a3f728000a
SHA1: f227544036f2a785223723aff37f19b084707130
SHA256:5caaab1e6bed1ea511166432a8e8a03bccc058162e7d19019793e262535fb204
File Path: C:\Windows\System32\logoff.exe
MD5: ddb4f5dc12ec364dd325a2c63ab5f0de
SHA1: cf3c725036a7442de1d94f9aa70cfd524da258da
SHA256:4b5df4ce25bcd9cf635cded7333f5f53d23f57b2adaca1ddf987c4b717f7ffb4
File Path: C:\Windows\System32\logoncli.dll
MD5: 189d604d30604fcae6e33dc167680843
SHA1: 1d3e0cff090367ea7f90618c02bdb76ee01880ed
SHA256:61523303fe415bc9dd7f4fc3563b044bfd0652745ce88be2bc8ed476e8b8bf48
File Path: C:\Windows\System32\lpasvc.dll
MD5: 7f83b82e5e1cc5fe233b19692b276b02
SHA1: efdb832661e97d2ebcfcaa3d5e0a286858a7bcc0
SHA256:a4b922201936ffecc8603bedd5e44dd0e9d09317cb3e6aa8f50994ab9c214b6b
File Path: C:\Windows\System32\lpk.dll
MD5: c64e8b47234aa309179b979bdc6b2d07
SHA1: b4c2ecc6d1f6112406e288f14eb23042f86ec160
SHA256:1e13f26ea43d8907e8543947435fa78f5e5fe3842f1009cc9c2846cf45396ce8
File Path: C:\Windows\System32\lpkinstall.exe
MD5: bd0fddfe1313e9486b10bf6536cfbac0
SHA1: b7ef6ad69bdab0d70497284a3628182107f8803c
SHA256:bd0501529c8344478b31c167f629c79a81b88008bca5bd601ae05a651ce85d50
File Path: C:\Windows\System32\lpksetup.exe
MD5: d8b64994532aa4ee7892b9e3d01695a2
SHA1: c0c8d431ce47bcd933b5b02ec2dd199398594250
SHA256:e093bae146f017ab53386798b495a3567ea8de1f26002245a9ea3da637f3ceb4
File Path: C:\Windows\System32\lpksetupproxyserv.dll
MD5: 9c7da37135f43ebea9d2828cb3fed248
SHA1: c98749e8801d8c5e85666ed6bbe1263db3be66eb
SHA256:527cd804f1cf85284092586040f843f52834d20e3a01d7690d1f3f15dca9df1f
File Path: C:\Windows\System32\lpremove.exe
MD5: 622c122775628aa268dddaafee621d96
SHA1: fcf82058d7df7b6a20d2f758924da3cee4b29852
SHA256:adba6d8a0218ee647ce826932dcd3591b25abf84c62f13b07d2e10f37834a476
File Path: C:\Windows\System32\lsasrv.dll
MD5: 0352ebc1f70de72c0914a5b5e529f437
SHA1: d856968269f217213f64a32fe0d6af77de1a82de
SHA256:b10acef0c8bd54567b85b0d3c5ab568b61d36a60af0794fd8c090370b304c175
File Path: C:\Windows\System32\lsass.exe
MD5: 60e18f7b8d1f43731d0e9169c2d16547
SHA1: 83ebb66f070956225959ee773b468f89ed55479c
SHA256:efa9e8325232bbd3f9a118d396de04370e56c3c7b6d552fab46b5b39f3ad522d
File Path: C:\Windows\System32\lsm.dll
MD5: ad6b2531417fd3089d62c51aef6a66a9
SHA1: 25e2548a50dab1b527acbac6ae5a4adb46578fc8
SHA256:5239e9d7c4442fff121c20196cff5d1ffea3425e9f0ee8249e90a25d39b8bfbf
File Path: C:\Windows\System32\lsmproxy.dll
MD5: 9606b8e3495c524916075cf6cffe9a62
SHA1: b0cd24a0a7261803ba482e21dc4943397e0e9860
SHA256:557889449e3ae50811d24347732501e5cfa07d98404d1bd95fa8cbd04580f877
File Path: C:\Windows\System32\lstelemetry.dll
MD5: d7c072cc87b529779b9d196ada550b57
SHA1: 9b18ab03764fa0d33588322722fe232f7d0814c3
SHA256:2d386c0ef21c245b1ba2cb124b3ce21589f31004ad509713ed81f49192c54e05
File Path: C:\Windows\System32\luainstall.dll
MD5: 0c986209574d463b59b3832fafa378ff
SHA1: 5ac229b4470cd223844c7bcd0411bfd1fafdb00e
SHA256:4baea85fc46a9db7f81d6a74c04cb408e94138c2548d4f7aeac51229decddcc5
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_01d078da8c0f4900\ludp.dll
MD5: b6675cd43552de1c00bf27170eeecdf5
SHA1: af887560749ac1c7100f56ad4db56f053e7d5b45
SHA256:4a4161c7f76cc50cca37b289cfc0e02fa11961635665c300ce9d763186fe07b8
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\ludp.dll
MD5: 16ad56ce2c0fa06a8f6f6b3a773555ef
SHA1: 8be75b057470ace8f950f2f464d7d00fe3f26530
SHA256:c93f492fdb5a6246a57999cdf986cc04fca91b604b38c9ab9c3c3d5d30a4ffca
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_fdde6ecd49c3a98b\ludp.dll
MD5: a71ce6bf8d5456da64cb3d50ad2dd038
SHA1: d6ab4aaa1f9b99603b4c58d00c1bf33966ece7fb
SHA256:8792f39b73748d87044570090febb690769b1075993bbd7c5a5c189874eb5405
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_01d078da8c0f4900\ludp.net.dll
MD5: f2fb6c52dba457fef630e193f8023b34
SHA1: 3b11e01d43e7392ef44c28ca839711f23e5839ff
SHA256:8381459e86440a12f9b9f4d1c520a2db2d262b590880eed38fda0b8a792a9b5a
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\ludp.net.dll
MD5: ccdd8c1cacf9a11158aece69e9afd2f5
SHA1: 099b0ba2d51be627f7a3ace791fc02fdf5e08e7f
SHA256:02f1af28621ad0f4d80b8331cef9ecb7fb21682d50f5573f0277b8fb733748fe
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_fdde6ecd49c3a98b\ludp.net.dll
MD5: c90ec7e55016e0613e1ef16d17d683bd
SHA1: 13afb49e379932d827abfcff6307bc6c679eb188
SHA256:438296cfe74a71d7bf3e7abcc2a6a7726154143bad3b6dc06225ccc7583ae89f
File Path: C:\Windows\System32\luiapi.dll
MD5: 5eb5a6d8216c28ff0283468ca2856710
SHA1: c6313b85e3b91177d1db613047fe638cc3c76970
SHA256:4d4f7ad72ba24d2e1f99e6217419489b6f3a96cbe7548b3346a3fd3c63fe1c91
File Path: C:\Windows\System32\lz32.dll
MD5: a244f50c3a6b09e3067aeb839d29484b
SHA1: a9b4b0d9f6eac80f4df5eed04a830015b132e77e
SHA256:a8f6dd4694023a7c21261c6b453c66885941054cd59e93729c94f320c2cd4ffd
File Path: C:\Windows\System32\makecab.exe
MD5: ddc4d94a10ea81bd077f4e079898c6b4
SHA1: 25a72865e5aea480260a975ccb72a6ecdd8bbdca
SHA256:5af04d753b84466110f514b7fd9cba8456ac18076d6a7b6847afde1232000c38
File Path: C:\Windows\System32\manage-bde.exe
MD5: 84021d418863a3e530d2e3f65f5d154c
SHA1: 4eee495d9121cb6bb510a1298e209b175454b1ad
SHA256:38f20a75e04bb9a53c563152a90a5b29ab689aff58d6abd3e005d156ee4e4c73
File Path: C:\Windows\System32\mapi32.dll
MD5: b42e63560a2633ded2a512a0865d2299
SHA1: da16ab602efbfab29ae0d78878b02154ae69231d
SHA256:607e5a24361ab558a32dd636b6edd93ab80f3713e5eb9b01742b22ed455d9359
File Path: C:\Windows\System32\mapstoasttask.dll
MD5: 7fe9e00c5860c656bb0dac01bacbe471
SHA1: 0a6d2618c8dc53c3db0ab9dc470488b633ada16b
SHA256:5d03b6ae3e6ec040d0edacdc337c8845af725db424c5708641c696c11358951c
File Path: C:\Windows\System32\mapsupdatetask.dll
MD5: a9c028357b19372109c23a63dfda01cc
SHA1: cec1b9c699ab8e8fe25ef34b7e5d61d6a1f3abc6
SHA256:2b972ac40e468bbc8d4d096a8f9034b8f58379f80f61bde60ecb59b973b2b8de
Description:
Maven Wrapper Jar download, installs and launches installed target Maven distribution as part of Maven Wrapper scripts run.
File Path: D:\Bezbjednost\bsep-ra-2024-kt2-tim-16\Project\Project\.mvn\wrapper\maven-wrapper.jar
MD5: 6058337c6ed4603858c3b72f754efa9b
SHA1: daa475c180514b4f190714f7a4df4ce4ec7b772d
SHA256:e63a53cfb9c4d291ebe3c2b0edacb7622bbc480326beaa5a0456e412f52f066a
File Path: C:\Windows\System32\mavinject.exe
MD5: ba7406f8e75cdcd520ad544d61a1584b
SHA1: 3d424f46baff93758764eea65cfbd9e3c4c43969
SHA256:e7718ecc35b5b741c71ed360265cad53a989fe2c751b9bf6e6375568005253b0
File Path: C:\Windows\System32\mblctr.exe
MD5: 9f76dd1e4d50cc2b370be14b43ccb30b
SHA1: d7080259cdfba1a036ca13c79c1b0b7e743ddf28
SHA256:d4b32e00010213cdfc54c1a834d8bcf4dcbc564c347337c48e706a0d9ff5203a
File Path: C:\Windows\System32\mbsmsapi.dll
MD5: ae94ea00a190da3ba823fc836b46c104
SHA1: 51417cd548a9ae1ff45a5a36202ab51d298bc520
SHA256:632b82bac34c4e11c3f43f653a7646a3d433fd2c73c12a47adf65a0f8645feb3
File Path: C:\Windows\System32\mbussdapi.dll
MD5: 61a372045bb0dd0ab7b89ef77dae189c
SHA1: ba8417c06d6008c3d2ae89dce406fb41ca45b809
SHA256:0c36ce7507be77447a773d5c959934474807029bbf967a271392eb61e921cb4a
File Path: C:\Windows\System32\mcbuilder.exe
MD5: 9ee06f45cf8d8154fa53bc0b0397e2d2
SHA1: 2cd73f065f259027610bf59b4dd6448e90c5104a
SHA256:b139d09d95e5a1de02a00324054fd3db7d7e874e881c2420441f2576496f8695
File Path: C:\Windows\System32\mciavi32.dll
MD5: e9944f49dfaa4d580ddfbd676d61d397
SHA1: 6f9e0bfec72657355ee400c71668779ee41b5ba6
SHA256:30317e32d7f5e36ad2674353a198f5b2760ff121c40cc0cf11be0cf9729fadb5
File Path: C:\Windows\System32\mcicda.dll
MD5: 508dc29d0b7d5e4432595bc3573f96ea
SHA1: 70b649acae4f1db0bd306687f5033fc742414fe4
SHA256:706eca5dbecb808f43ab95d2a49f10395a5b46847dfe7ccb7b86799b4e043c19
File Path: C:\Windows\System32\mciqtz32.dll
MD5: d33ff4b6a41a38c16a11da4698c8f5a3
SHA1: e5981bc83dfcc57b7fa370f3e04ba7ab8018aa6a
SHA256:126e8840d720e6014a4aa188f73a7054fba81109833076b119b5b95e1a586761
File Path: C:\Windows\System32\mciseq.dll
MD5: 3e239ab691f85b6d336f501cd6e3622e
SHA1: 9847f493269c0b6d8ade54f45bfad422b47293d0
SHA256:d03d079701fe0a481a9321d1de50c7405806e9d7ef350cb61b0655096c9850a2
File Path: C:\Windows\System32\mciwave.dll
MD5: 533dd0e1b02d19df359035a98dd4f8b4
SHA1: f486d4d64a2d7f1b37d300cd567f79205c6bdc02
SHA256:f851423317ae0c8246569a648f094396f61e5a5855084a8ac23cd3deca9e5a85
File Path: C:\Windows\System32\mcupdate_AuthenticAMD.dll
MD5: e71c1995d0df06dc003c4b4f31bb46f8
SHA1: 5daa8734f66e6ccc45a77e9467c3783e0d957688
SHA256:77ea63186d43354bfbc6e28188843cede3f3cc49335fbd1a688c48d0a2cc7c4d
File Path: C:\Windows\System32\mcupdate_GenuineIntel.dll
MD5: a719a641167956699558e032468ba229
SHA1: 44a88f80e44f3c35d2d8e0903a7eb3d394a5f7c7
SHA256:fc1b45835dbd7cd9dac6e6daae5c00de5ef8c7335206f5c08ed1188624c9478a
File Path: C:\Windows\System32\mdminst.dll
MD5: c0080d7330389670fceb807e421091fe
SHA1: 691c66ab82f12dc5aff3c2761baac93529d4e362
SHA256:e5aba43a99d6e46e5ccaed7f8a6acf4c0c5ba913c298df75d068c2229fa6e713
File Path: C:\Windows\System32\mdmlocalmanagement.dll
MD5: 978765020035fa8f4b8f2654599def48
SHA1: 0a235291feb97cda49db43ac57a91b0974420920
SHA256:10ceb412a0fd67e5d1b07dab88dd8566b5e45b1760c44dfeec655103028a1a1e
File Path: C:\Windows\System32\mdmmigrator.dll
MD5: 2ec2b3e0c9021b2e184f053fcc23a412
SHA1: c6463312a2fd95b711f303421b048d0c8c797445
SHA256:6d0e70e6a8f3c5d85ca674e8228fd850f701b72f2f43779a7c56c2f500c1a392
File Path: C:\Windows\System32\mdmpostprocessevaluator.dll
MD5: fb20e55aba8add28c582447d22f0a5f2
SHA1: 76394a41556723fbd4c6fcc74c04e55ae6aefe66
SHA256:5fa75e9749db799801d89265b0b25421cf77a989e519ad4e2bb2960d972cfa9d
File Path: C:\Windows\System32\mdmregistration.dll
MD5: 6b17ec3a289d35831023fd73a3144e86
SHA1: ac33d5ee2fb25d5795ad0c0d193537ac0644bbeb
SHA256:c1db1343df289a41bb6c8b94e1ce4c9705c04ca00cd050ee66b4e97b40304aa4
File Path: C:\Windows\System32\mf.dll
MD5: 36f8bd52b3ffed07b5a5c59f480e58b8
SHA1: 4da149acf6302d49c4a5f9108e1705dbff6085eb
SHA256:80f4d5309226e9ce4ce4b2d9218d716c223774ee1ca8f9f15bf6938d89964b7d
File Path: C:\Windows\System32\mf3216.dll
MD5: a33f9d9c7a226ecd2c233a0a2cac893b
SHA1: 4454b98fcf974d33976ab159a781137f00f4350e
SHA256:47ef3b1e263f3295829a8586ebb43a9d2b7f74cb4f4d31a45b673de926660bb4
File Path: C:\Windows\System32\mfAACEnc.dll
MD5: 8f236615e5dd70cfde50e571f1a1acb1
SHA1: 6576589eae84fd8b6bb4f44d8682955c265fca8e
SHA256:d30c42889e0ea0481e79a5dd4cc273ba9ff46b75cf2923bbb829b670d5ea0e1a
File Path: C:\Windows\System32\mfasfsrcsnk.dll
MD5: d4970f7bc60ba5d729e43460b6aea39c
SHA1: 91c1a238f8b09e1594e106fe6400a1fd1fc13b39
SHA256:92dc856b4fe7f6e1a7dfd5f1fdef32d2d12b8eb5b2e85d8c8fa2213eabbff6a6
File Path: C:\Windows\System32\mfaudiocnv.dll
MD5: 805e9f92c116453db027c83241202e72
SHA1: 044168de80029fede6ad45c9c2aa1440f479a974
SHA256:0218e99d719c0e928f9cab3b240777292ae4c54f6969c2d8c4d3d637998a55c6
File Path: C:\Windows\System32\mfc100.dll
MD5: 5f4342c36142c4bc8736776283089a58
SHA1: a34fc8ecfd2c34ebb5af6de63c2c6fe2163b6ebe
SHA256:de96c788ec39a1764ce83790fdcc85717e101b07401b8d36ee97be5246b66b93
File Path: C:\Windows\System32\mfc100chs.dll
MD5: f07b4e23acd59ebb95e95d79378feb5c
SHA1: 96dcc25a6cb9618714b122433006fa26a1e7374e
SHA256:85e83bccaaa6086f6cddf066c8dbd15b60ed56fc244ca0ddc67071d797ffded2
File Path: C:\Windows\System32\mfc100cht.dll
MD5: 04f4b38c1dc37003c42d29fe405825b3
SHA1: 8cff7a74714037d4c04104f558b4f84b1cc11232
SHA256:d556642e6330aa575cd5958ae97a2236fdaf9961b34231df84e008fa728d8f2f
File Path: C:\Windows\System32\mfc100deu.dll
MD5: 008d45f7bd304eedcb107d4c58fce959
SHA1: 5ed13336d6598344ac97b523298bbd974bcce7d7
SHA256:15a31e83e80ad15b039717fa509859cf21b8588601b5a57672b945808e3ce219
File Path: C:\Windows\System32\mfc100enu.dll
MD5: 91d051930e1ac33fbd9014ff3cb9b5bd
SHA1: b0c934b91c3f37da0426de44a34be52c67dc049f
SHA256:beb5603ca76fb95ec17c980cb2aeda258c69f25a55a58e3efd20df92aeafd5a1
File Path: C:\Windows\System32\mfc100esn.dll
MD5: fbc74a6a0f47ee958eb800ff95b5cf44
SHA1: 977c350a96af8e9d8dedfeae4bec9dce661adc86
SHA256:601a385da2b235ae8e3720be29fa172ffb8e310c0b007789efedf4fb2aa70cb5
File Path: C:\Windows\System32\mfc100fra.dll
MD5: 94c963dcaa1bf515b57205716e485fd7
SHA1: 2002abaff177de0487f66ded368b7fda47d51453
SHA256:8d8a1bf1d8d53ef78f43056b16ae03df7b7310912bcc6a95a8b7adc6e23eb03c
File Path: C:\Windows\System32\mfc100ita.dll
MD5: 051237d05d8979b51ce1b0442ca61020
SHA1: 2c255765753da4a90e50f37e60c4b35d911317b0
SHA256:595bbc3a700b399e226004408fe26f7e6f1e22239c92826a9f55f2b652f49c4b
File Path: C:\Windows\System32\mfc100jpn.dll
MD5: 2de6abb69969c76510aec9c072cfb65f
SHA1: 0678c65777b5047e3f3df3078599da2610f8cfed
SHA256:f4d0de161b5610ec173391ef9c30eb9b363ba88cd90459ea679ed596b5f16098
File Path: C:\Windows\System32\mfc100kor.dll
MD5: 317606b89047093df45a157f254e5560
SHA1: 7c08392b7eb327fdd7c0fcef0d152361666257b8
SHA256:1c664eacb6aa5022c7a6efbe1ea4422f3f24da9b37c5fdc97ccb95715c660999
File Path: C:\Windows\System32\mfc100rus.dll
MD5: 91377116a916085c1db20f46a4ebc9d2
SHA1: 93b2c5c1eed34202634778d55e52bc76740c42c7
SHA256:a97b65d0f3b4f0a2a448d814fa11d1abfef4b019cb76ef6e3deb052b36432ccc
File Path: C:\Windows\System32\mfc100u.dll
MD5: 76168dd534e0adf0f30f0ca809525fce
SHA1: db1ad6be6c601bdb37e8fa90159e488f7e4f4184
SHA256:39955dbbe00391955fa8313ff1b9c815be7b6aa615d36345e579476e789e91ec
File Path: C:\Windows\System32\mfc110.dll
MD5: ed15189b63c78cd4453954e0c9aceab0
SHA1: 4cd2b0ed839d4ce4216b179f61f8606c94ce84b4
SHA256:18fca73cf08bd9d27511b2da1ec6573c352ee7d00bc5f2504a8ff56b28a73551
File Path: C:\Windows\System32\mfc110chs.dll
MD5: 10ae8bff037a69718ee6f4aea2a3c752
SHA1: 2909ac4ec88bdadd947c8fe82db5e1ea6f0f31f9
SHA256:ba804369560a31d6e9e623f37abaea3e5bf06cca457de3fe8a1c26786f2d1238
File Path: C:\Windows\System32\mfc110cht.dll
MD5: 405e6cee49f463f406c0a51af82eb964
SHA1: 3f77052afdaeb6317ce6c2b682bb65f9a5c2ca00
SHA256:06b7b1bdd83b32c621d4a9349280ab99455c830643d97a78e78ed844fb30e5ab
File Path: C:\Windows\System32\mfc110deu.dll
MD5: c2dcb7fd239b310896985d2b31c089f7
SHA1: ae3ecc96b21d3a3b32e8d77c3922c90f440f4913
SHA256:70969f6ffc7dddeb26588410cf3bee5c40d27761d4116859f4e25b083656bce6
File Path: C:\Windows\System32\mfc110enu.dll
MD5: 2f41fa824c59cdc2c3e057d55069f826
SHA1: 67518ca99b7d14876aa560108bb48b4591e82eac
SHA256:6279e0d79f7f5cb25431de09a76d6c6db197e6b2a6713b9329a1d2273271ccd6
File Path: C:\Windows\System32\mfc110esn.dll
MD5: 99542f773cc9b80e91a870ad771728b6
SHA1: 0857599bca0fa9df2705d4dfc46239566fa7e815
SHA256:272cf9f204737851f31161d6e6a31347918b33dfc052d0ad046f5d7a9c2ad14d
File Path: C:\Windows\System32\mfc110fra.dll
MD5: 44fe45c7fb65697649cdd60f1c57e022
SHA1: b93fe4a462b6720587e898068961f6c601b57db1
SHA256:90d556905811217470a98de3d08d0b523313729dd7b799d324a9424cdb618600
File Path: C:\Windows\System32\mfc110ita.dll
MD5: 5c2cc00020b825e82217fe4fd99037fd
SHA1: aaa698a70436bf5b3963976441b727dc56558513
SHA256:5dedfc5fabb64875918cf846628a133744bb8812bc9319f517e9e584b181aada
File Path: C:\Windows\System32\mfc110jpn.dll
MD5: 87a1daf7680142e4962e0e7776c53877
SHA1: fd82ac55ddedb62b24b4510f65ca8bc2361d5628
SHA256:b3aab7a77d7d1379be3b5e87bc627dd933074cb6897300c479ff2a5c67fe8efd
File Path: C:\Windows\System32\mfc110kor.dll
MD5: 3172360933d603020c082f87a482a457
SHA1: 1ff5de6b281566c6b474d073d5749bd6f137065f
SHA256:cead3aab9ec7d02c826b0701292a11222cbc213b47ac1f3f040f38730a3202e0
File Path: C:\Windows\System32\mfc110rus.dll
MD5: ed679e821b2ed9b9e38c18ef3549a292
SHA1: 8f8a88fdf786117a9dff9bb528e03cd55e176833
SHA256:972e7259cb56ee54a4e5e31df1324f78fe22703535fc6ffc8e9f5eb4ae421ab5
File Path: C:\Windows\System32\mfc110u.dll
MD5: f110cf19d56f58606eaae8a685279338
SHA1: 1f5f9b99929fb39cb7ff002fb0d7a21fcd43063f
SHA256:49559ea7183464f3564c562e7d216ce78ef1e66ac9dea2ece32dae00905f385c
File Path: C:\Windows\System32\mfc120.dll
MD5: 262593ab5cc592fd8d2b90e8f3b03266
SHA1: 7fe2ca21364eb6b9969c8673f80b32c72565ff7e
SHA256:556442cbd59faab1bc639f0a8c129f2e4a505e9fbbfcd0f279d53810fa669f8a
File Path: C:\Windows\System32\mfc120chs.dll
MD5: 58bbc79a32110c948466cae4315e0e1b
SHA1: aa130d3c040be702a6ec20ee6949529c2a3bf0b1
SHA256:75bc225d5af5e8f267ee940a722aea1696a969fae777994881d3ace490d97bf0
File Path: C:\Windows\System32\mfc120cht.dll
MD5: c38c69b5a41b667654244e53f1a814c8
SHA1: 20555f17e7073ab06a151b4e48e7a08ab9d93a7e
SHA256:829871005a8bb56838f1ee22d786070e87bdccf9204a07612d6505004d29a5f0
File Path: C:\Windows\System32\mfc120deu.dll
MD5: c5ebc101e92d1849a7b3880047fdbca8
SHA1: 0577b78fa1fc550989e0e412e1ca4c39bc6f3e26
SHA256:9cc7ee7335777aa1eb393eab8bfe5250c0f2fed10ac3a7c58ee3c4ef9662f6d8
File Path: C:\Windows\System32\mfc120enu.dll
MD5: 1708b225dae258b847a447628c6a7a5d
SHA1: c1337818dba48c18c17bd9d231cc996ce73d161c
SHA256:87554af8b85815f5aba84933de6809d76e1c1bfead70b2fdc7439e5a6b5302eb
File Path: C:\Windows\System32\mfc120esn.dll
MD5: 5fb33b2ced7aa5d69707eb31c4d4b7af
SHA1: 6d9f59b14829c425d5eb3943e5704eba341a5134
SHA256:09f4506791b162cb14039fa3c656358e55089995534626f8e7fac0b4c66c3bbd
File Path: C:\Windows\System32\mfc120fra.dll
MD5: edf43fb1f708b1d5ecf6af64b2106275
SHA1: c5deb6320bea70ffa8cf67664f5bace47d992a3c
SHA256:0fcf915499d7a0df41d115e3d578310b6f5cf1c17956c08c3a42340f08b87646
File Path: C:\Windows\System32\mfc120ita.dll
MD5: 729ac7c4146890693fc7f8aaf8d20539
SHA1: 0394feef49cf0a5c60451527b3a2caa0d6e51c52
SHA256:6884b0886e3001d08a38a9c4cec196a6a8aec348bb24cd4fd91a05f120103341
File Path: C:\Windows\System32\mfc120jpn.dll
MD5: 3c976744835f3dd9d6ef459a650b3e30
SHA1: 80cc70f77ccba3602a0d11abf0c98cbfffdeeaaf
SHA256:57dff553b1608ea493f69697178c378e74d68b472b14d52a9eb1ad627dfbd54d
File Path: C:\Windows\System32\mfc120kor.dll
MD5: 46aba46ed83a1cd9c8e6b5b7076d2f7d
SHA1: 7889b34c82ee63f4c11b5ba160b699f4346d693b
SHA256:ded612342b84998c1d8681746c81f970f15b31db4928118c743b9d24510b820a
File Path: C:\Windows\System32\mfc120rus.dll
MD5: f6e6ebb21b23eb772930732288451936
SHA1: 251d39e307fe5230ac510956d3ffe23ff63f2037
SHA256:1ad8f734737afb18ff78d211351ffbe422196c5f6591407e53082e0f68a89ffc
File Path: C:\Windows\System32\mfc120u.dll
MD5: f334296734f1633b0b74ecc48ea4d87d
SHA1: 883af4d2e1a06b90a1a5d61fc17adb1ef6db87f7
SHA256:38437948c1bab1827963c08de7c82fbfa4fd3020f8b8c1ad02588878db4b29f7
File Path: C:\Windows\System32\mfc140.dll
MD5: 014957af9c07e7be8893c075ca520733
SHA1: 99be5e4f144ce5820b20014a2908551df08ce2cd
SHA256:ab996e0c7b66d9363e656f611d27707ae25a28c3b53c69ecb3631a801a8eb89a
File Path: C:\Windows\System32\mfc140chs.dll
MD5: 35d4b4f3c7671c64238c0fe2d0343154
SHA1: 7b8e0fc7b02cba89d8776a103442b2912250695e
SHA256:4a635bce8df33528314b416c05a47cf9072864ce68f34605bce45130987e88fa
File Path: C:\Windows\System32\mfc140cht.dll
MD5: 4c8071d22436dd2c0158bafa768a4b38
SHA1: 4c1624aae4edd952c915402ebf3195b8c2e18d43
SHA256:b1c2b30b29b16449863c76e58e4889a0710ac53e629cc80d99943739744de6ae
File Path: C:\Windows\System32\mfc140d.dll
MD5: 8db2143c0ec394567d2ed106db635430
SHA1: 54938cefb9fed46b05553482acb89762c7f64bc7
SHA256:34df498ff165f0fdbb97ce0177f52fb7d8a868d2834a357102303876f81fd165
File Path: C:\Windows\System32\mfc140deu.dll
MD5: 094be2f5e3fd6bd712a3dd20322d7641
SHA1: 12ffffe0d652a44324e777df18fe5f5569c1e710
SHA256:5d07c29fc502ba088b256b9edabb48352a3dee14a27dc2393b84b5ec7c4c72e8
File Path: C:\Windows\System32\mfc140enu.dll
MD5: f5e6c70cf8f73eb2f15b6f13c70f67ed
SHA1: b015fb62339a0cae99139e1e2a07a7a266ff8dbd
SHA256:2fdb316db29a76bcf6d3be37b455d593515394d14b9920a55532d23736809278
File Path: C:\Windows\System32\mfc140esn.dll
MD5: 2407f3e818e3829a0b9d8935c86cafa9
SHA1: e6d7a65ce5af3a3c057f1bb1c9699cd6c8923656
SHA256:3b2d0b9beab4add2c7311c4629e495aff71ebe69517db5ea9fe5ea1210ee2e0d
File Path: C:\Windows\System32\mfc140fra.dll
MD5: 7e3e89278a7f50ab0b0462caf22562e1
SHA1: b8b7897cc5fe62c264499def43196cf744a7c1a2
SHA256:87a9bb92ff492b681c45216f0b7613ddfad8e95254d4cd0213d1ecb9914bd009
File Path: C:\Windows\System32\mfc140ita.dll
MD5: e1872975c17cf2d011d2177193d124ae
SHA1: 7a0ece8cdfa2b53bd168f4ca49ea8ef74e750cc4
SHA256:7f1c2858503c28773128748068466fdfb912322e0f149c9e22e48a99e3c2de46
File Path: C:\Windows\System32\mfc140jpn.dll
MD5: 6b1a54578da5085d3420595af3386c3e
SHA1: 9360bdd57981edfea20916daa3fd01da8de574ac
SHA256:9f6efc6341e1fa3ebd64c27cf0a6712167b7c024c23725c5d4f67f08431b727e
File Path: C:\Windows\System32\mfc140kor.dll
MD5: ef8a8a19952a64deba2500f4847c1f67
SHA1: 139d2079229ad7c5367bf7d765bceee1eb4a7d9d
SHA256:bc68d107861572a1bade7e709979a59ef78608ff911417df4cfc3123afed5d1f
File Path: C:\Windows\System32\mfc140rus.dll
MD5: d6d8e2011100738512eaf23bc83b5c1d
SHA1: dd7d0703355953d32ab642ed6aa43b26a4cdf80b
SHA256:64cf13b655b0d540c32908e26460d30ad49ff8dc9742db4ad05e4827c88c597d
File Path: C:\Windows\System32\mfc140u.dll
MD5: 65ef03da9776cbf419ba2e1fcd401f6f
SHA1: d64e3e42e48605301a75934ba9b9360b113b46b9
SHA256:af58c3453d628cd942421c1c43b8654ccd94f8a21f27c15eb238036ae68129fa
File Path: C:\Windows\System32\mfc140ud.dll
MD5: c595872e85b01576fd81bad5ece8afa7
SHA1: d313a3b1e56aa1e46798a55f65fe349f386f6cc2
SHA256:90e574eda42b176e0fc7a596c81688a59a96258de8366f3ab180e37ec2397ed9
File Path: C:\Windows\System32\mfc42.dll
MD5: a9530e59cabd58c4fd5c2414e4b9d245
SHA1: b15de155ebe1fe721548bef2f69a18fb20e5ab53
SHA256:f85a8e0e70ac147f3cb72c21e4f6c16d2e4e695825a17d6a0c749a5f6066e869
File Path: C:\Windows\System32\mfc42u.dll
MD5: 090c36af2493b75924c4129d7f85d39a
SHA1: 1dd43cfa3a898f68bae5dd9ddf940d9d8553d819
SHA256:9574dfcb31a4c4ba3d2e5b1ace6d008819f1e5b817a43af4c562d37de63ea596
Description:
MFC Managed Library - Retail Version
File Path: C:\Windows\System32\mfcm100.dll
MD5: 9256fec63b2ac302cfbca3d186b00807
SHA1: ea3ca7fce7d473e7c6c161f0416c7963ecc13841
SHA256:a99a2de10ae40071852fd63d08d6c2ea9a0f115dafcf7cc4f27fbc9bde0b249d
msdia.dll in Microsoft Debug Interface Access (DIA) SDK, as distributed in Microsoft Visual Studio before 2013, does not properly validate an unspecified variable before use in calculating a dynamic-call address, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDB file.CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
Description:
MFC Managed Library - Retail Version
File Path: C:\Windows\System32\mfcm100u.dll
MD5: e513d681b3e763d0e44653041c129317
SHA1: f15e0ee390491d8f961801674028b5528a31f889
SHA256:311739fee33b091ea55801154c1cb4ac8a9a18fb6ac5f6fbf31d958307b3d0ea
msdia.dll in Microsoft Debug Interface Access (DIA) SDK, as distributed in Microsoft Visual Studio before 2013, does not properly validate an unspecified variable before use in calculating a dynamic-call address, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDB file.CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
Description:
MFC Managed Library - Retail Version
File Path: C:\Windows\System32\mfcm110.dll
MD5: 4e3685c1423c10273102efffad418ceb
SHA1: 46e59eca1fe8af6a6f4a0803492acb3b1471852a
SHA256:8d8e108ab7b57de812db4736811311595e1b785deebff1868dea739720290b84
msdia.dll in Microsoft Debug Interface Access (DIA) SDK, as distributed in Microsoft Visual Studio before 2013, does not properly validate an unspecified variable before use in calculating a dynamic-call address, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDB file.CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
Description:
MFC Managed Library - Retail Version
File Path: C:\Windows\System32\mfcm110u.dll
MD5: 41a15a02c343bc5640a0a8dab6cee181
SHA1: 1794f16ea26d1d214b7568787361525da8a4ae67
SHA256:4fd4dad2f823aae2f65f0ade89b22bba24edd35e0bac685c91ab3be0efa104e9
msdia.dll in Microsoft Debug Interface Access (DIA) SDK, as distributed in Microsoft Visual Studio before 2013, does not properly validate an unspecified variable before use in calculating a dynamic-call address, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDB file.CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
Description:
MFC Managed Library - Retail Version
File Path: C:\Windows\System32\mfcm120.dll
MD5: 3a3e2e9ad62a2d059bc995766e61ff0c
SHA1: 46b6447ce9d7fe62e64b37faff810e434b9b5ddf
SHA256:88c468e87ed00fc08288e9fb673c6a82aeb37b935c6602b8444f99f0659fcc98
msdia.dll in Microsoft Debug Interface Access (DIA) SDK, as distributed in Microsoft Visual Studio before 2013, does not properly validate an unspecified variable before use in calculating a dynamic-call address, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDB file.CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
Description:
MFC Managed Library - Retail Version
File Path: C:\Windows\System32\mfcm120u.dll
MD5: 31b5540f8b7b7e3214ca8e174628977a
SHA1: 71d1b245b6196657b7b07d86ae21f6eea9530509
SHA256:dc62ac8c36075e17b1cf194643ddfee3e897e8d38c8aea6b13a0cfa83bd8b806
msdia.dll in Microsoft Debug Interface Access (DIA) SDK, as distributed in Microsoft Visual Studio before 2013, does not properly validate an unspecified variable before use in calculating a dynamic-call address, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDB file.CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
Description:
MFC Managed Library - Retail Version
File Path: C:\Windows\System32\mfcm140.dll
MD5: cbc7feb6c9b126c89d59beff6a1f7edb
SHA1: c8edf2bf0df59f0cf4543a129028cb02cb256a22
SHA256:66afd8ec41695dfe7a2e40525df358133ea1f9a73e894dbfba4e4ddf4c93825e
msdia.dll in Microsoft Debug Interface Access (DIA) SDK, as distributed in Microsoft Visual Studio before 2013, does not properly validate an unspecified variable before use in calculating a dynamic-call address, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDB file.CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
Description:
MFC Managed Library - Debug Version
File Path: C:\Windows\System32\mfcm140d.dll
MD5: 26446d31b466623711538b059eef6692
SHA1: a26aefa5c7c5d57a8d729c1f5c050602b1cb5735
SHA256:271e68f40343d9c0da51703dd8803587855c3203d2635ecbdb76fbccfca281e7
msdia.dll in Microsoft Debug Interface Access (DIA) SDK, as distributed in Microsoft Visual Studio before 2013, does not properly validate an unspecified variable before use in calculating a dynamic-call address, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDB file.CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
Description:
MFC Managed Library - Retail Version
File Path: C:\Windows\System32\mfcm140u.dll
MD5: b48a22029bf2295b944229e74d965190
SHA1: ab693e24e16fc11568f2780129b9995be2e65101
SHA256:5f413c4dec7a77a03e1c30e5141d504806b31450d44344b6ab2cd4b0cfb60320
msdia.dll in Microsoft Debug Interface Access (DIA) SDK, as distributed in Microsoft Visual Studio before 2013, does not properly validate an unspecified variable before use in calculating a dynamic-call address, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDB file.CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
Description:
MFC Managed Library - Debug Version
File Path: C:\Windows\System32\mfcm140ud.dll
MD5: 8c1559682970575ac9c423a286e6a661
SHA1: c274ba1711a6386bf41b82b53cb25bbc60ce8c58
SHA256:7ff4e1484fa906a1bdeedf2bfb52f0e47aa130228dcfa20296af560dccfc35e2
msdia.dll in Microsoft Debug Interface Access (DIA) SDK, as distributed in Microsoft Visual Studio before 2013, does not properly validate an unspecified variable before use in calculating a dynamic-call address, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDB file.CWE-20 Improper Input Validation
Vulnerable Software & Versions: (show all)
File Path: C:\Windows\System32\mfcore.dll
MD5: 643bf2e18a43c0bc7dc764a35e22adc3
SHA1: 1731f32dbdf21535913e362c5a4f29d11bc77baf
SHA256:212a53566850b5fe32dc80f7175657715f669c8c44330b45b535512b833099a8
File Path: C:\Windows\System32\mfcsubs.dll
MD5: 817f94733db9bcea6bcd4fd81296f82b
SHA1: ef61fbe7e7cee4642dc695b45cdf5b6b40ed6f23
SHA256:bb4f7ea087bec11099be250a0eb4dbaffe6485c60303cebea179a5c602fb061b
File Path: C:\Windows\System32\mfds.dll
MD5: 759fe08e9a8651f680316e2405490e45
SHA1: ed6934efe5baad7abb07551bb0023d16aa5a496f
SHA256:68884b71ecedc9f39d211b3c5ecccfbf9b02745eb974890ad9f3a489b1d4f252
File Path: C:\Windows\System32\mfdvdec.dll
MD5: 0ec947764afbe65edbbd364bf89cf49e
SHA1: 56187f98f28c7bd654ca54cecdac101409a4c2f5
SHA256:153358ccb7d06c7bcedc0eff14571e3366b05519d854180087e1bbfb4f57e3a6
File Path: C:\Windows\System32\mferror.dll
MD5: 43c0c68adb39f43b66f17d3437b4b429
SHA1: 79697b355a7e8474849ab0843cd8cfd17ba026f5
SHA256:f750e1dbf57a85ea150238f69f7ba672d7f60a764226a76f6ea7ce7c5009aa70
File Path: C:\Windows\System32\mfh263enc.dll
MD5: 3efafa536dcbaf0d7c1a9babc14d66f5
SHA1: 23ca8be24d3cfd6824cd299990d9ee4ee8f30000
SHA256:c19c08d1c2293928a32ada085f46d90da827410373369dc7f4ddc51c785f5e24
File Path: C:\Windows\System32\mfh264enc.dll
MD5: c1ef0de755f786684eef27c83ff75cea
SHA1: 2802aed1d8f0fbdd2af5b0063284dcd7c36e957f
SHA256:6bee34eb749bbf0824287245a39485dc2291a83afec153266bd699ddcc19acfb
File Path: C:\Windows\System32\mfksproxy.dll
MD5: 48b32a082fba152b9c7fbe29a74809b3
SHA1: ed6759f50ab40e6b878228925130fc9d87976cc6
SHA256:c6e41b5298bcf574f60445ba0ef710869a80f9e360999d5103875280e5acdf4c
File Path: C:\Windows\System32\mfmjpegdec.dll
MD5: f6719b6c4ff23afdec95c066e2faf502
SHA1: e8b7bd56c1754b8e72503f3610ed2617d8a64b45
SHA256:6ca9d7b2eac3f3e941cbbebcc719b6352687fdb8934459335e68d77c73cf8ac8
File Path: C:\Windows\System32\mfmkvsrcsnk.dll
MD5: 3258370afd4f797b3e734fbc7cdc843f
SHA1: b2d3f9aaf083ff392b0a620c40d438b112134e94
SHA256:0e80d875188056eb2bfd0c33d76c8b43d9aa486223160b57c5b0a1cd76288fe0
File Path: C:\Windows\System32\mfmp4srcsnk.dll
MD5: e105f4ea92bbc833de37d4f9cb4d15bb
SHA1: 3170162b73dfa2fdd07a8b4555b830c9e4e18b5d
SHA256:945942a57fd0460c10e05f0f1ad282b3797daa221abe7253d915d8c0816a8f4a
File Path: C:\Windows\System32\mfmpeg2srcsnk.dll
MD5: 79f511c6f0c60b03aabd55711f1823dc
SHA1: d1ac7818f618736b8febfbdc6e9c53631f0d8b36
SHA256:5798244615a1a66d35d394f9c2af76d4123307b7fbad3ff936117f8f8cf941e4
File Path: C:\Windows\System32\mfnetcore.dll
MD5: f8814961d70a5036ec2854d99f41f941
SHA1: e06ea42cf0d3ad27368fee5038afdf565b4703bb
SHA256:572d4eef38bd786db3c6453a4c4ad893db479e8b6b6f3319cb840711f8b83d48
File Path: C:\Windows\System32\mfnetsrc.dll
MD5: 11c158587c861abdc4adafdbcf42902b
SHA1: 786cd7f2193f901c6347c071e9396a392f740b25
SHA256:57e0254266ba4dbaa2c1a75491d166e26e43721f9cb184e9904c99d787987424
File Path: C:\Windows\System32\mfperfhelper.dll
MD5: 8c0407e6173a8292b45d14d6ee1d9ecc
SHA1: 8c4d5ef94403a5e95aca03b062f86d17fe554b93
SHA256:ad7e97ad48a818bd078e4f691515e05a24d8a8d865d8b3f93e1febe32efad8c1
File Path: C:\Windows\System32\mfplat.dll
MD5: 495dacad5be6a0df8fd8bf8e52a917d6
SHA1: 0bc4b1ea8314b61490b5f84cbb78591c777b9f0c
SHA256:7d061de4fc26c65f76c0977beb9cbbad1952fb93e9ef1a8d2817f5c8bbbcef9d
File Path: C:\Windows\System32\mfpmp.exe
MD5: 8f8fd1988973bac0c5244431473b96a5
SHA1: ce81ea37260d7cafe27612606cf044921ad1304c
SHA256:27287ac874cef86be03aee7b6d34fdc3bd208070ed20e44621a305865fb7579e
File Path: C:\Windows\System32\mfps.dll
MD5: 016a7b2fb734c10222cfb399374186af
SHA1: 2c79fe9b69308470bc60b4af638f568c0e0ba2a7
SHA256:e7ab44d5f5c035e8ee0a831945262ff4ea8f4ce1d04cedd9b496ccf4e8ff3e95
File Path: C:\Windows\System32\mfreadwrite.dll
MD5: 356665bba8b2f99c15fdbde2977c684b
SHA1: add407ad29444cffbdf51b9884651fcba6e56921
SHA256:dcab5904b744aba17cd10c31a9dca66bd8a523aaf438cdbbbedfa2f310125a46
File Path: C:\Windows\System32\mfsensorgroup.dll
MD5: c8d0265c7d3452e96c7250620c4e3459
SHA1: 3d6253fcc3ceec13c29515b0bad0ef5441051f88
SHA256:532f2058a621f35cbe2223ee44a19d5bcaa09c411f4534b72315bb69fcdff475
File Path: C:\Windows\System32\mfsrcsnk.dll
MD5: 64a7b6121b422bb55481cf5b31393952
SHA1: 9ec865c5dfb1ef5d24557bd80bf1c155c3ae6de3
SHA256:d240819eac96596d92dac76e823e125529ba8f90e7b9e5999fa0572997b7cae9
File Path: C:\Windows\System32\mfsvr.dll
MD5: 526223f0a2d9959d45cf96793ded68d8
SHA1: 8c86d6717603916e6c8b69f579326ab5b325daed
SHA256:f3fa55bc14bdcbe96a5388320d9b2e144e870ab8ed0192f877854bde04121dd8
File Path: C:\Windows\System32\mftranscode.dll
MD5: 39f3887d7ad451568a62624ba640e3c4
SHA1: c69feb3957dfb97944b17689ee76dd0ca9ae0921
SHA256:031165705fae6bb4477e09a7490ef776c4acf3d90a4aa0cfda1c9ab675567476
File Path: C:\Windows\System32\mfvdsp.dll
MD5: f8510c09673016ce64a23c0af6293cdc
SHA1: 60a0236c4b8cb437ad4e170ba28ee69b6a979684
SHA256:f55d5529d44dcb09d3a6efc31b667cd207969cc535d4fdf9372fcbca02eb0e1f
File Path: C:\Windows\System32\mfvfw.dll
MD5: da0247387e2ec40e2493d572289cf482
SHA1: a9ac27510756db553479c20c75689ab8b58b0685
SHA256:47957b3dd4c5205dc02564965a8f188766c283e5efbfe460c9d6d5d0002daf2c
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\mfx_loader_dll_hw32.dll
MD5: 704d6bb6aa9deefda5542abecd4290e5
SHA1: 74b7b571cef6ed26ad39670095d1a271180f263a
SHA256:b8082ca5ee6af1f65f51838f475665353b050c0b68a785c2ce7a2b8ed4071bef
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\mfx_mft_av1hve_32.dll
MD5: 91594230d0df88de1b343411c066fc6c
SHA1: cac9a1ed4b5eb3e7256d92e764a67e61103fc9ed
SHA256:85e5558102780f372b18c609f032408f0e6fdf1d29fbbc253a1b0d606bc2d364
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\mfx_mft_av1hve_64.dll
MD5: 535b2caba43f283f02a41341772a79c9
SHA1: 608f8b82475ce9c80ec8afdfab2ae1a0418b9392
SHA256:c6c0dd91775f4ccc0a30148c644984536a6d21a8508d6512847727e683153cac
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\mfx_mft_encrypt_32.dll
MD5: 8eedc69070b25ca977608740e6964741
SHA1: d0f2a3c5014ca632310d4a5cb87cdb0d63ae4952
SHA256:b186552183950b847978c3981f246b6dce1571a7e5b8e446e2ecb52a3073d0c7
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\mfx_mft_encrypt_64.dll
MD5: 50d867c2dfbc79e97f8a29753a32d642
SHA1: 664ea321f0406751b47dd504244309d6194a48e0
SHA256:b61d9c63960ff9ba779c16bfc625634c6278d45b5ec58f7791100005081f2dd2
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\mfx_mft_h264ve_32.dll
MD5: 63e766f395c59523b7d85ca56e6b8650
SHA1: d602d3696f600e707ae120ef0b30c51970595da2
SHA256:5d3872956021014e5ad39d7f864d35bfa22f563ae2dd567b24b6b00f6e0a615d
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\mfx_mft_h264ve_64.dll
MD5: 7d6079cd9042357e63fe60b8aa0b3724
SHA1: 591069fa7a6f575f54f0c89f84c4c1e7b371c5c5
SHA256:6124d4044c8dbab563bd33440a1ff97f428328d3dc2b547d81988d1beb346769
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\mfx_mft_h265ve_32.dll
MD5: edeebc153e7a038029ea20214509b571
SHA1: bac19270e45bd8b67272c718ff4bae533eaa66fa
SHA256:3c33ae35ef1ef4e77ff016d8341af31b169ee23b8337740363864dc744ac41ef
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\mfx_mft_h265ve_64.dll
MD5: 6bdd814ca6f1b1c309db3d532cf955c0
SHA1: 696b1fb49b71a35138f2c405c8c4f51c86eeb695
SHA256:f131aea99acd49f32f7ee917c310df0837b2adae8d70c1a55ed8ea5439f99cc4
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\mfx_mft_mjpgvd_32.dll
MD5: 0c6a342771796188774e255e6d483fa9
SHA1: f75cd5348191c512ff0f276074e1160e6ada9fad
SHA256:95f127ca8d3d368edfdf60c20d1780cfb85812c9994e646bdf46b5682c34a4ba
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\mfx_mft_mjpgvd_64.dll
MD5: f0d03d6f6546c979648361fe588cca53
SHA1: 4121159bec7dbd5acbbf4172ffe212488a00bad0
SHA256:8e677365a140df100b019b4e6136984b610c06522d7765e557c6e869083b8eec
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\mfx_mft_vp9ve_32.dll
MD5: a855a2f48dbc13145c1c641494cfbc8e
SHA1: 9d6f6e8880007c274746a831c6007dbd8ff5eff5
SHA256:f50f0630d8798708094b8726e6f23fcc0aadbe42e4f537bd54c168699b8d6f08
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\mfx_mft_vp9ve_64.dll
MD5: e3b0198af5989650db34d399e51885ba
SHA1: 5e95d0439b7dee938e3377c7f8b86dfb3613d830
SHA256:83786c66963f647eb17c2362017845d2ff04c5e667751890ae33f76d7bfa7c06
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\mfxplugin32_av1e_gacc.dll
MD5: 348da3e91c6e1687af45a37238f91931
SHA1: 1b4fbce8e0a0807460fbf4905c1cf64e10b3d423
SHA256:bb9d40d248d048ddd0175cb9bb978e11463c22090909d390a17d13ff5b8c5d4e
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\mfxplugin32_hw.dll
MD5: 6ca4fcab7b89555750ca75456ea482aa
SHA1: 01ea8bd997cbea60ec73ef53424d13cd5545b251
SHA256:30d985c3cc80d3948b68b92380dcc6cd64fcce363e4afa7f87788eb8117eeb3c
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\mfxplugin64_av1e_gacc.dll
MD5: 6604520fb9ca6a1e4a718e5e26da8e4c
SHA1: cec3d81b3e4435008f694c1fc417b91426960c21
SHA256:7b90d3c9d3affeb3951c7808a3c2c8cdb6653d2790c5f597091e7b6c5224e4d4
File Path: C:\Windows\System32\mfxplugin64_hw.dll
MD5: 3c11260c49e215ff1d36d91cca1790a9
SHA1: 69991ef9f8c4df5014e80a435460d5763c6e942c
SHA256:7972dbcd8fd48b7b945406b38fb7e8e66c87c8edbdf116e788565ebddd1dadc3
File Path: C:\Windows\System32\mgmtapi.dll
MD5: b62979f30a115079ec8aa885aaf561e8
SHA1: d57f9981fa35e65a470dd4191548d48632da4c9c
SHA256:601b02e4a5bcfb3e898482dee4a7707eb5335731b79eeeb7bc003e1c4f39cd12
File Path: C:\Windows\System32\mgmtrefreshcredprov.dll
MD5: 4c593973f1cd4673c5fc82c3eb7ec461
SHA1: bc514d924c9e2e9b7ea4e54beab92b93f5247ac2
SHA256:e90113e52eec445c4af93835a21fa7080bbf8baee4330f5d8fbce95b1f520d1c
File Path: C:\Windows\System32\DriverStore\FileRepository\mgtdyn.inf_amd64_a6235e923dc4047c\mgtdyn.dll
MD5: 4142f07a644950d036ee4ee518f99f37
SHA1: 1036f6413047a008a17fc6d5c5e92c9398be9fb9
SHA256:fa1c9ee29c7881149346fc43fd8e7bc1dc2b4f9da0b1b09cfc527cb6053e60bf
File Path: C:\Windows\System32\mi.dll
MD5: 583253087dc5321f4890486d05148de0
SHA1: c35d0d26ec82b03ee09aca114723bf7af5c16d85
SHA256:2272e87c90837df2f2945c38e33f6feddd7b3daf9cb37932d6e258ffd57f609f
File Path: C:\Windows\System32\mibincodec.dll
MD5: fdaf4c7af71d5328b934ac036762ae6f
SHA1: 7854ccf0d1fe994d1d84af65f5353d826b869320
SHA256:1c4b528dd618f9ece196523720f038ee3eede19b05c9ecb57bb241c63e919efb
File Path: C:\Windows\System32\microsoft-windows-battery-events.dll
MD5: e2041d67e7f081c1071c17edd179c5b9
SHA1: 049e57733b7efd3f7bebda4be12b1a0bc8002caa
SHA256:5a08ac803f78864048cdb6a0bcdcba9891937b828e9377fb0cd77cce06fc53a9
File Path: C:\Windows\System32\microsoft-windows-hal-events.dll
MD5: 5202d4dd0414d7c7bbb6c1c9ec1943cb
SHA1: 416b2c62d1da1d5b7cfcf669f9cbb3d91d8bc739
SHA256:fa4c7b42ee1007eede8e1f51116b3f4851faba088e48390bee0a52b7291591ce
File Path: C:\Windows\System32\microsoft-windows-kernel-pnp-events.dll
MD5: 779c87d85fcc4f4cb44115c37f81c233
SHA1: 8467868d42b29028caefd2b07e5bbfcc66d3f6e8
SHA256:9dc8cbb606b91b1fbaa622f6b726d13cdd7ab859a39fc26aeffe7e64ccb88771
File Path: C:\Windows\System32\microsoft-windows-kernel-power-events.dll
MD5: bd7fdb30272565dc68de1b65e8c9c3a6
SHA1: fa017248116f1e1ba69415342a50f1a17f887755
SHA256:bab219ea38bb720712bd582dc24bc1c6baa8e43592b76a1e88a3f6e25f423ef7
File Path: C:\Windows\System32\microsoft-windows-kernel-processor-power-events.dll
MD5: 576f7e7900bd581bd37cf4ff2db1ca3d
SHA1: 8380fbb209af08479d14d50c94013157f382ce1e
SHA256:b8d16ca40b073ba39c74f45e19b9b93f8fcb08ec77672187685c7e3e1839a489
File Path: C:\Windows\System32\microsoft-windows-pdc.dll
MD5: b6c0cbc8eabf0091776a8246ed598820
SHA1: cc9ccb193e30128798c964d1523ac4c059e82486
SHA256:ad9d50bd0406fe7cf1e69302b8defa7397be224c5ec94f28f1d74a5e7bdbada2
File Path: C:\Windows\System32\microsoft-windows-power-cad-events.dll
MD5: 37640d1f1d1695dbe889fd67ba874c48
SHA1: 3c4068554be9000c04b214e1d256ac4da8a5bfce
SHA256:99cde84b78b0f57ea8aa8c76a08ff1b5cbe707aebe3276db1f52808e786d7b4f
File Path: C:\Windows\System32\microsoft-windows-processor-aggregator-events.dll
MD5: 6de93a5b994578612d56b6f28c3a9fa2
SHA1: abedff238120cde2b516d741084eac7ebbfa441e
SHA256:26c987340aedeb79a2eba6f334e55a0f3a759daf8714a7063178e4db62f44ef0
File Path: C:\Windows\System32\microsoft-windows-sleepstudy-events.dll
MD5: e64a4bd172a3f839b4c34b5c7eda448d
SHA1: 0731dddd3ef20340db62a13a67bcb6f915dbc395
SHA256:32f071efa5d54c0dbbf8632cfa5ec35bbacbc1ce233932b3c21f2e8bfd8d2fde
File Path: C:\Windows\System32\microsoft-windows-storage-tiering-events.dll
MD5: 58e8cbd053e64539fcd87bd08ab89d1b
SHA1: 70fa7d97a39cc1610a2d66d8aa227e33f5dc1a36
SHA256:6e71d0bb7fa0f02071460c55433209794f95f81058186142155de0330915b3c7
File Path: C:\Windows\System32\microsoft-windows-system-events.dll
MD5: 26be56934b1b616ddafeca304364e82d
SHA1: 82ff2d427cdc2c911236107d4414622875cd7dc0
SHA256:ef3aa521a3598fd4e2e3c091e44fc42c8b9a4a142ac3d4edbbbd71d04374b1d6
File Path: C:\Windows\System32\microsoft.windows.softwarelogo.showdesktop.exe
MD5: a2ee9fbfc32e92b9de3ff8a2fafd79f5
SHA1: 3147c293eac48f424146322b43c145cb3536664b
SHA256:516c0d862be5d18748ab6c3aed10773f4086b2feb0747cee5560cca21f75b7d7
File Path: C:\Windows\System32\midimap.dll
MD5: 817b674c0ecd6dee2e1e3f42afaa8d74
SHA1: 08c0d3159102a062f99cbd5076b49dbf4fc4d318
SHA256:2b5035c8c97a6a0d30ea4faf3a4f09f40c6a6545aaf94f06e323dfa93c526da1
File Path: C:\Windows\System32\migwiz\migcore.dll
MD5: 7ec9e2c9967eded3ba8185ca490c0ade
SHA1: 902a5f64d908c6a4e5ccb79522ad89f70f4ebe31
SHA256:dbee72b9816d53dec10959dbcc51dc961ad9ececa3e65025fbbdbb4c7ef1f524
File Path: C:\Windows\System32\migwiz\mighost.exe
MD5: 3c328c20d75c292354dcc2c3ae06ff10
SHA1: 97854042a32d33f5588e79b62311401ec346d84c
SHA256:4b459f70524a0ba16c7f771473c60b1faa77ed00d242b7a3e083e67fd8d79244
File Path: C:\Windows\System32\migisol.dll
MD5: 8e514e5f6df4cd5aa186472b4a559752
SHA1: 09927fa8df8ef86afc51758b7ffb57b2dec1f1a3
SHA256:07b46761e55087fb51ce5c9511ff05faad4fd1643ff991415c8e2bfe6828512e
File Path: C:\Windows\System32\migwiz\migres.dll
MD5: 0dad64fdf25a50494c3ab1f6f396460b
SHA1: f5ceac79ca21878ec88c775c1512c5e0d3860521
SHA256:38a528e6c301c861d494fa8064494b416f856972e551064991402e5f37fd7bed
File Path: C:\Windows\System32\migwiz\migstore.dll
MD5: b970fb726f81c9f322b65b009ef8b757
SHA1: 1e4e95b30eb5a859e7a639144c659fe930cef2a6
SHA256:a93a9cbe7d2a14b2ad9c9a3f249cd8e02c270c27fef4cb36e7185dc61f7b64ca
File Path: C:\Windows\System32\miguiresource.dll
MD5: cb612bd0353ba7151c1e6898b6e962c8
SHA1: b4cbfac922bbc0b99f8e8ce30ee9c2db893be21c
SHA256:6248846240929afd09bd74fb91d08617e5cf07314c219562f37dc28e30474684
File Path: C:\Windows\System32\mimefilt.dll
MD5: 645dce812666b3e492289edd02aa545d
SHA1: 253f1a0997e62081b42ae3152c301a9ee21d44e2
SHA256:5db2d024df21157d78f7684704a87d34e60c5d6648efa74d7f892f09addbd475
File Path: C:\Windows\System32\mimofcodec.dll
MD5: 4c220a9fd4d1aee3e5861fea1ab3573e
SHA1: ba6a6627917900a5740110e589c8ea602c2ba341
SHA256:b95769a76e3148e35b76eae351f22c1ac609c6a4fbf5e0794deeeac13b55bd1d
File Path: C:\Windows\System32\mispace.dll
MD5: 2bc2df4ca5959eeb31df45577da1b1af
SHA1: 9e780e8eef4318cc1b0303abb147c87c2616459b
SHA256:66a49addc748b2361cc297ef193bfbf988d2222339abca6fe88549dccdc69507
File Path: C:\Windows\System32\miutils.dll
MD5: f01af9bbabc9c8946435687a2287fefe
SHA1: 011b782f86e8466d9c633da250167c44ae6ac4c2
SHA256:adcf0903a0de4a00d5c35f21d255fc74fcf7d3f8bb76e778b99c9c7de6aec5b9
File Path: C:\Windows\System32\mlang.dll
MD5: 3bc06a5f3ae706a2d3ae7c4e554e4250
SHA1: 260957c2c0e65aad9d9d732fd78c4ff833f25bd4
SHA256:e14fc09ece5502a1e3918c63e6d998271c17d643a3de5e2c2a271263a94d8d97
File Path: C:\Windows\System32\mmc.exe
MD5: fdf0fa594c3fc99758bd88a0d45da30e
SHA1: a6572f84ed525d17a7c35388346d731a5c54fce2
SHA256:32b6f6165cb50bb9ded7287dc16706f5a5109a37d7022ffd2b4e7beaff71dc68
File Path: C:\Windows\System32\mmcbase.dll
MD5: 161ecd134d289e89be82c39d39e2763a
SHA1: 8f668c9532aca091098ccd94b4491fa36e9d2374
SHA256:6face1e6d1993b4100ee2229f64c8f4c0c8cfd875f9ddc70760a61fd205d1eef
File Path: C:\Windows\System32\mmcndmgr.dll
MD5: df162349b43bd4042dbe8f734bdf0d7d
SHA1: 3abd6f1800e592d3d4d63653614db2f3ca27161d
SHA256:9c123f5e56103164d66d2316419bb66b849e2b484679d654f97175db4836f846
File Path: C:\Windows\System32\mmcshext.dll
MD5: 0ffce7330ce3e0dec0e50953458b8f3c
SHA1: 94a6dac1dc2645963acd2f4b68ed464c763a4ef1
SHA256:e5cfff151a4f9bd0682ed65de1a7d897d30b96690b91e0988ca260c094ca6652
File Path: C:\Windows\System32\mmgaclient.dll
MD5: 2948ab334fe5b7fa4b1d6f37594116e9
SHA1: 3324b2891d3626fa268a401d4d7c39a104afef5c
SHA256:ac28c86e7f8b49a31650fe7f173520b57181aed3eb38c01c25090d07b0af1bc4
File Path: C:\Windows\System32\mmgaproxystub.dll
MD5: 3c737fff00d42b61b5477ce3842c19ce
SHA1: 1ab09cdd673e9797db430e325353a82fddc8aacc
SHA256:f1f2b30a7af7bd2e295a67ba67bda5b24706c435b8e2b62c578b579d2fd428ce
File Path: C:\Windows\System32\mmgaserver.exe
MD5: 0a0efdae3856559897806e4f6184cb58
SHA1: 38a32aee79b080ab561fde859c419cd409d61368
SHA256:58c497a7e7bf16d989827a409be2a1f73e2dfc4bd15455c68fcc6fd6b9f50bb3
File Path: C:\Windows\System32\mmres.dll
MD5: b915d33b4e55c253615673d063b1cc7e
SHA1: 4d2fd955cd697d78c19ad56fc4caab6bfe62769a
SHA256:169b9ce6933f080341a9b3a107627f376a1e0cb229112dbd36b30d61d6cf2e44
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_01d078da8c0f4900\mmstate.dll
MD5: e3935547c06b942490021b43740f073a
SHA1: 9488b6ac77b29de308d2b19fb4a04fbead5c760f
SHA256:5a3d3d0b536d3821feb06b3c1a3f9d109914935c4f439069a526ef1b5a6431b3
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\mmstate.dll
MD5: fcf5577d098d187e8bdaa73af0e99d1e
SHA1: 02d490debcc2e5c907ceb8f387f87b7531c690a6
SHA256:6c1018eca11b358d7b2c6f24f0e719bdc403d70ec41a8f803f3d682545215dde
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_fdde6ecd49c3a98b\mmstate.dll
MD5: de0f1aa206fd843864f70b27f1565976
SHA1: d0529910a76b6803448743a8d553036006152a50
SHA256:c6c9684c046b2adee60a9b756c01e9a14380414a831c09d1712228474ec9e397
File Path: C:\Windows\System32\mobilenetworking.dll
MD5: cedfb09daaafa887e97fcfcd988e6c02
SHA1: ce16837ca1310fdc28b29fd9193088a48f242d5c
SHA256:b908607533bed55b32a2d99664ede9533659a74ffbd5dcde4481528ce15161ca
File Path: C:\Windows\System32\mobsync.exe
MD5: 97eecb551ea2ddbffd3744a5dfd26031
SHA1: 5c341b3eb51ead573de65a7d0c727274c7bf9a3b
SHA256:fc0a9d457f7ea459e386576ae77deac1a6b95805c2da357086326f5777899928
File Path: C:\Windows\System32\migration\modemmigplugin.dll
MD5: 118c444dab53fbcd67e83fc15a384620
SHA1: 1bdcc285d4025c62c67f33de788a5c4bfa2a1159
SHA256:2ae4a63a4597f2344aa758e672d620c211d87fa14cf258337fad3c1baae09123
File Path: C:\Windows\System32\modemui.dll
MD5: 015256ebb25fdabc1837d67f059460ad
SHA1: 57f1442ebcb53b7661ff1673b7ae99715b167b57
SHA256:bac620739ba28b1c6bbcbcc23ed59f3d683781f1b4645ca89f3bd11fbafdfaf8
File Path: C:\Windows\System32\modernexecserver.dll
MD5: 05148e73639e9c56c47db4de54521e70
SHA1: 079db9d8bc25529295414f9458ca84236a13e728
SHA256:6a9e090f2b69af534ea07e88e492163463d45d26a4d9211fa44c463ad76120f9
File Path: C:\Windows\System32\wbem\mofcomp.exe
MD5: 7f402f8d5fa692a5c49b6c988ecbe786
SHA1: 03d0527e75800f3372bbc5326281073ec8ea5195
SHA256:09f068a5c3aee86bd2c2386c2acd6f08ccadbcccdd0e0d185d3177dabe5fedeb
File Path: C:\Windows\System32\wbem\mofd.dll
MD5: 02cb44c36025f4fdaeff2a0aa2c4e806
SHA1: 2b080c4eba7a6f55f9b64dfd836903f87e91c2c7
SHA256:b5b786c99df29ae2e7b77fdb7c36b8838ceb90bbf6d61712e3c5d8c772f3001b
File Path: C:\Windows\System32\wbem\mofinstall.dll
MD5: 8245cac07d82ef74d43bdfd221d6b739
SHA1: df928de29319df86061d3cf08b27b005a054e027
SHA256:d9cc5097135ae36e550f3695bb98f29ef95224199c32b8f1d8ac79e44f38af8d
File Path: C:\Windows\System32\moricons.dll
MD5: d06109b78a02cc8ce0d985bbf6bb0944
SHA1: 3a4cd66421092faab47cc9c3a38bd883f98fbfb3
SHA256:c0b2cfee062de6cd55db9478def456855f8beb2e7e7fec8103ee6016dffb203d
File Path: C:\Windows\System32\moshost.dll
MD5: e675b7bfe0fb4df37fefef926c33c1c2
SHA1: 88cbbbb561b71dc21355547b47d1a846c9d96ab4
SHA256:67bddb34df43bad276772b982208202136fc5974aa8bf5f257a9839d182cc9a5
File Path: C:\Windows\System32\moshostcore.dll
MD5: a68e1eee728f6e0fa3c750f737d850bf
SHA1: 92ca4a4fe10f3aa1478c7363cfdcaefb309d88fc
SHA256:e1102b374072c3fe6dfea82b8fcb7bd9cf3409d42aa6c93274990a5e3745ca22
File Path: C:\Windows\System32\mountvol.exe
MD5: f3edff85de5fd002692d54a04bcb1c09
SHA1: 4c844c5b0ee7cb230c9c28290d079143e00cb216
SHA256:caf29650446db3842e1c1e8e5e1bafadaf90fc82c5c37b9e2c75a089b7476131
File Path: C:\Windows\System32\mpeval.dll
MD5: 695500833b489cbcbfecd08b1faf81c5
SHA1: 6d4b085c151f3849630516795077166028c14e27
SHA256:2a8993f81a3a8e23829fe6f13dfaf32840633b2d1aec73a7c2ac7acf15acee72
File Path: C:\Windows\System32\mpnotify.exe
MD5: 8f9739e266623499391cbac652a01036
SHA1: da16142d698dbbd243930e5058d7756f2204296d
SHA256:33f636f222a3af0bbbe429cc87b25b21b6c56182936c81c9453c4bdfb61a3c5e
File Path: C:\Windows\System32\mpr.dll
MD5: b4989d55b02e3dee82da9222cd12be30
SHA1: 0c3f5eb5862dc2d75d3e859e36b65954269fdc5c
SHA256:c88767385db737683142ef952a595ca9d882bafc6fb1d327651bee8fa0acc55b
File Path: C:\Windows\System32\mprapi.dll
MD5: 781b515e4e0a6883e895cfcf90006241
SHA1: 71a1bbbba025f3cc960151fc2fcbb339f12727b3
SHA256:a2abe9036cfb972b4866dfe0f3af8a9521281d74827a376e1b579ece80b4fdbc
File Path: C:\Windows\System32\mprddm.dll
MD5: ea1fd3215fb665b0ff7b2ea524ffd1c1
SHA1: 298f22cfc5734b89a88ab85a2c246f4813117cac
SHA256:582ef264099e1412ca9fad98920c0005d9c98eb8bdb180a422408142de9c3172
File Path: C:\Windows\System32\mprdim.dll
MD5: a24b5535638037f686c8b712521870ab
SHA1: d9e75b60c80381e65b858b90fc7e96d80e5ef15a
SHA256:d91791e70ae0a9e69a0175da8283c90cbe13d88298284b31f60bb1bf6b83dbaf
File Path: C:\Windows\System32\mprext.dll
MD5: 0eabd6ab464758f058fc039a47f61750
SHA1: 51bc562a59e565e3f39a54e4c788896b8803354b
SHA256:f96e8d99b736e4ce7997bb1de65d88c32e16f1f725d8bd98f52c39a02969fd87
File Path: C:\Windows\System32\mprmsg.dll
MD5: 0e14360baaf294586bbf562154eac92a
SHA1: 78e64778f9ff3eef06c4ded446ee850f07f381d1
SHA256:2cefafedb58b0b4c4ea20e5f2ca67bcffb2c69b742f426506e5b1433981b8136
File Path: C:\Windows\System32\mpunits.dll
MD5: 20ad2ded4415952fcb6b112b47d4e94c
SHA1: 5ae551c5c81939b6747935d3102a275d95443ec9
SHA256:85207ca07ea16e9d033d1b040d2af5686ba1804f0e09aa35a47487e4070fdc65
File Path: C:\Windows\System32\migwiz\dlmanifests\Microsoft-Windows-msmq-messagingcoreservice\mqmigplugin.dll
MD5: 34edbfc24ff575730459e7f607bdd05b
SHA1: dc91b7d2f39e22e843214cf3275e4109c6f57664
SHA256:4457a3d902983e67120340712cb78fcd1573a8cf1749c46249c27b8796824141
File Path: C:\Windows\System32\mrt100.dll
MD5: b1bcb646cd9873f4e641472a8892151c
SHA1: dfbc54f094e5cc40b7a4b4d9789faab5c290bfeb
SHA256:26ccb798294d90845330012876e5e87994541be212fec8d5a9f01adadc093d18
File Path: C:\Windows\System32\mrt_map.dll
MD5: ca38d29ea401068262ff1c9e19cb7a0d
SHA1: 74f29a4c1151bbf4c7598fe935eb80cca97b12f0
SHA256:0b72bcf8e3baba1eed08c80d71c7259c1abb73e380adea9313d7c25bd20e2f73
File Path: C:\Windows\System32\ms3dthumbnailprovider.dll
MD5: efd3cf9e545378d1f5d3813a687da66f
SHA1: 145d6df9a44ce8f953747a687e2660ef075353ad
SHA256:0b75e1159bc91df07dd19db525f948b833aa0917e6f59251a5dc0402eb3b3db6
File Path: C:\Windows\System32\msIso.dll
MD5: 4c2fc446ccb9b192e61bd8eea50b9573
SHA1: 89eceb4cff182249d2161afe8dd66fcd37468bc4
SHA256:c49cffe54f6862927e2e25bf648ac2acad40663b6f1d56fc5343f4c38face655
File Path: C:\Windows\System32\msTextPrediction.dll
MD5: d03d40c32fcbfd1d4f937590ec7c6b04
SHA1: 7cae744b47dcf3f2261a71d6a71fe27d9d87f972
SHA256:90f85143d49c6322c3afd8538cfc439747393b1bdcb20916fa812b632ada6f24
File Path: C:\Windows\System32\msaatext.dll
MD5: bfee321960e62178f5e060040ee1fb48
SHA1: 77017fcdbf13e858b307be692af535b65c29a0a9
SHA256:c735e14c88487b5fee6aa03466f1d702aeb304f71b244a36ee478905aa186565
File Path: C:\Windows\System32\msacm32.dll
MD5: 001e37752b910abde457f9293124cd05
SHA1: ce815bf3b602eee79e1eef030d2896b1116b0b92
SHA256:5d8dfeffdadae26ab25d15aa84896faa4d0fb8276f0bdc31799681559a99daba
File Path: C:\Windows\System32\msafd.dll
MD5: b11857c2050f4d10731ee0b481176a85
SHA1: 59bf64486fe96c3454b9d974d717d33f2ad6543c
SHA256:c758a6a9448f739be478d3dbf1a84abf9ece53b94d5b82c68e8ea222ccf1892f
File Path: C:\Windows\System32\msasn1.dll
MD5: ab9535aebfd8ded1ba9743a1a33c8344
SHA1: fcb93a019377c297088b8ef6a1215dec3e732d81
SHA256:a40b90479bef00f51b15e02d8cce799a15248237eb68e73a2732c0fa8461bbb6
File Path: C:\Windows\System32\msaudite.dll
MD5: 1d1a7def02bfbed97eea801bcc379f0d
SHA1: ff14b4c037f72a7f2d602c96ace758e1d77b82b3
SHA256:e92935a739b23f4cc540f4999c52da82f776d3ca6e643cfedd795e6e62e556aa
File Path: C:\Windows\System32\msauserext.dll
MD5: 1ca7bea4214d26d55d315ccb20bb3af7
SHA1: ef372265ae5adbe0bf081c7a737576ca634e2377
SHA256:775911f198bbb26963d98f06508e10797ca8f2f40293bd00db6715afc4097371
File Path: C:\Windows\System32\mscandui.dll
MD5: 731a51c8caaae0774f8e28ce54433739
SHA1: b2017f41e8344b09ae10da4fba292d1c9a0adb92
SHA256:00ffa5c051c34c2f7f4731025d5126cc9d342374aa84f65f5c3942d0faf013fe
File Path: C:\Windows\System32\mscat32.dll
MD5: c20e7bc003007f6d5183db5a97d797ee
SHA1: 9b6f697bcba00368efb713379601d164c3415ecc
SHA256:e81c400cc33bb84bffe9f77b46ff2ec0d8b1c388bfb3452616d0916cf996ccbe
File Path: C:\Windows\System32\msclmd.dll
MD5: 658df24fbfa3da3cf980cedf1c3bb4cb
SHA1: f6bb4c97feafea11075f1b33241b5a342c8ff6c6
SHA256:5a2b428d54376b00a86550eed7d0c98385244f8fd32c3a6f6f499d3c70729b4f
File Path: C:\Windows\System32\mscms.dll
MD5: b70b7272020e39a9953531755d4ca8cb
SHA1: 3952e7ffb7a88191fc504b15e2c49837bf26c431
SHA256:1c75095a776a0e2a83fbb75a4e5ce1ed3ae1663c902a2bb7d0caad9b3402478b
File Path: C:\Windows\System32\msconfig.exe
MD5: bfd3e1f90b944b660c0a09661c418428
SHA1: b619429d73800cc2434834ae97a09d443e8f4fdc
SHA256:8bee8ea97039d663208a2c8a209417ee6ade3f2e11d9afe6a511ae6cfa5efcad
File Path: C:\Windows\System32\mscoree.dll
MD5: d5971ef71de1bdd46d537203abfcc756
SHA1: cfef8f0ba040939b87b74f101970a6bbeb5da15f
SHA256:8828de042d008783ba5b31c82935a3ed38d5996927c3399b3e1fc6fe723fc84e
File Path: C:\Windows\System32\MUI\0409\mscorees.dll
MD5: c1e34e898670e416d05bd6e096782449
SHA1: 3d15ac9f98fb5a332ca8a5bbf4bd8da06fff76ec
SHA256:6e6a9c1ee0173d78487929016261fb1aa409b7498b7db63f49f1e84b44daee77
File Path: C:\Windows\System32\mscorier.dll
MD5: ccab97a45da872fab5d89a6ef647705d
SHA1: 32d4022a72b84c10afcc7de861c42173fe91ccd9
SHA256:2f1dcd3a1578ca84556154420d6baec9f943d434b7a2159db52202bbe3399070
File Path: C:\Windows\System32\mscories.dll
MD5: c1737abdf5b4576ae5b0553ffacab41d
SHA1: ba2a3cbdfe2571be779f96be894d6eab0eaf7974
SHA256:21c16a5abe6b085965ff810d9874282f21426376e6f4b6cb59bf87bf6dc9322c
File Path: C:\Windows\System32\msctf.dll
MD5: 15278cd6c1b3043f3c7a4fd62bab3387
SHA1: d40fbfeb2285b5ff648c5e2e2f78f52ff83aae5a
SHA256:330c1e65e4fa0a56284100e9076afc01a0e7aca5ac92a9434fefde79fc8392db
File Path: C:\Windows\System32\migration\msctfmig.dll
MD5: ed4f15310dbd00bd45eee9225e15d101
SHA1: 682c42f5bbbca51784020687b67bb13ed22a7c82
SHA256:dbbc816db14398ca7fc7002bcb6d4c82e7891198dfb36867fb8f136dd588d893
File Path: C:\Windows\System32\migwiz\dlmanifests\Microsoft-Windows-TextServicesFramework-Migration-DL\msctfmig.dll
MD5: b503e0f87c3c990dcfa880ace6a76101
SHA1: 2e13d8f70c7ab24d2533ac54cf4fdffe553455e8
SHA256:e7514a29534c666d33b7bd290e9598366ddf3b171c92d3195126ca5234c4878b
File Path: C:\Windows\System32\migwiz\replacementmanifests\Microsoft-Windows-TextServicesFramework-Migration\msctfmig.dll
MD5: 588d7e407926eae108d536e22b128854
SHA1: 1b6bc6bdba63bda71f05ec1e8fbf64dc65da478e
SHA256:cc0a08adf0b75eff94e9b22acedab688300cd3e2fcd72c92fbf0a073d1601464
File Path: C:\Windows\System32\msctfp.dll
MD5: 809ee99e044d5e0b73f98b9275c31cdc
SHA1: 568efc8df22786a7c53fae9498e398d7533f75d6
SHA256:fa734702430e21654e15045ac211f4bf3dd4e65cc37cdf7fc239a31912c98bb3
File Path: C:\Windows\System32\msctfui.dll
MD5: a284e049c7e9cd23117f632f6050b440
SHA1: 5b6be462de18ca88c4477f20adc2d674a3ec58a9
SHA256:c3b9e6e793e691ee21ad655182c0a5f005122b033b9b18835c7f83c89f9094da
File Path: C:\Windows\System32\msctfuimanager.dll
MD5: 155b0266e04fcf19aa02a59111fd218e
SHA1: e3f6a72578f49e09552f3e28feb1e932db07f23c
SHA256:df4b124b8def55524bfcc6de5f41592b6e40ea5e042052ac7ebdc139526c72e1
File Path: C:\Windows\System32\msdadiag.dll
MD5: 991e39c1ae7892167417ea864040c887
SHA1: acea7e5504194b0802cdcbc380a1c677c00a55fd
SHA256:f504e6cb95a6272372b0cffd1567306980576beaaf3a33317895850210b5932c
File Path: C:\Windows\System32\msdart.dll
MD5: 825744f8621bf2572fd55f0ede506303
SHA1: b5a7951598109fef3f23a82f5e289401e0726916
SHA256:8ae9c81fd38e85e131e135311eddacb6239c1fe979162e1cf362df08725e9048
File Path: C:\Windows\System32\F12\msdbg2.dll
MD5: f9b61ac69f767f42ec27e63d2c464783
SHA1: 2bf912812deba437e4d7dbdaccec885832e64f72
SHA256:abc825ceca6ca0ee2e7710db224f5f5fe0b16d4e544c165f210d22a602b4c7fa
File Path: C:\Windows\System32\msdelta.dll
MD5: 4bc8ff2d8b8ebb742b6d801af0ccd4d0
SHA1: 980d331a2b0a24042a99e703b929b8bf626f2983
SHA256:098a2a12856c374b418013a1806a9f9f14517c733aed83886ec657c21b57d755
File Path: C:\Windows\System32\msdmo.dll
MD5: 68d389886647d860e57426f081626201
SHA1: 7ecfe6ff45f1a85bb9c999df0256a013b3174858
SHA256:155cb3e8e57d23234708471e3cdde5bae48eb25aa3b6949d6aad03dc3eca3574
File Path: C:\Windows\System32\msdrm.dll
MD5: 9ff0692f8662c6df8968580daa471109
SHA1: fdb4ba72327e0f11a3dd83e682c192c03c92ebf3
SHA256:7484c2d1c753f3954254a548e7aed52a1733000ffff1a28a652b73da8b807a6b
File Path: C:\Windows\System32\msdt.exe
MD5: 14b0758b118df870b6149cfd59f271de
SHA1: 1cdfed18faea1b9b9bf1f84e3918f35562135679
SHA256:8d3bcabfc2f564f02c97821bdce334e8ef8121cbb9532d7bd2fcbb482f952dc0
File Path: C:\Windows\System32\msdtc.exe
MD5: 569bfdc096ca81251fcbdd81762ed7fc
SHA1: abf10fb223ec848189a4bbcd562cd1aaebbc9b41
SHA256:21fd140eb0050514bac574577d3cf05cb089898cf8c8478891de1e44feb27806
File Path: C:\Windows\System32\msdtcVSp1res.dll
MD5: 8912ea978fdcc2c5beccf286dc7f47a8
SHA1: 5ebcfb49f9257d4d57ca9816798e59d1015eb762
SHA256:7815bcbd2472029187f3f186b2adb8e6d91bad1780722c67738aa28e440b3d74
File Path: C:\Windows\System32\msdtckrm.dll
MD5: 4fa4192c1036291278cec348cb42a865
SHA1: 812573216fdc5c3fc60a795242b6af74c7373928
SHA256:666c35d83557705588ceb664864ab8f85a9d5343fab038f17f070239a8113a6c
File Path: C:\Windows\System32\msdtclog.dll
MD5: 5585c1797cb367aef32f413a5b08d42b
SHA1: 3bbbd50696149ee52014afa207ce0362e1930858
SHA256:78e510c456dfcf5d9a5b8f71c43b1b220e333aeded7b97b4210fc43b5492ef9e
File Path: C:\Windows\System32\msdtcprx.dll
MD5: 040483b8dfd2f3057b8c42e33bafa415
SHA1: bc970fb2a097898008ab4ed0a9b436cc63396b49
SHA256:c85319c64731b6a9d0f1fb8157d83b117ca885d119d1f62c8196b82ddc481666
File Path: C:\Windows\System32\msdtcspoffln.dll
MD5: 91cea6917b85ecc2d54f966085d7884e
SHA1: f1a59ef95ad63bccfe7e341f0363e03f0e6334f5
SHA256:786d93a8a00bba60319120b31f8dd0204adf72d72b120813574e071ade3e7fac
File Path: C:\Windows\System32\setup\msdtcstp.dll
MD5: c4ea41b79524633277220c79f7d5d092
SHA1: c1f7c1edf07cc8e79b83f4636b59b981d17fa045
SHA256:b0d6559f17fe8828216e73bdf0af571264f79ceee9819fadb50a64f82d95777c
File Path: C:\Windows\System32\msdtctm.dll
MD5: 77844c875d99189b832efa8c683c00b6
SHA1: e2130120f1f318db7357482aaa650e61f6e0c2ff
SHA256:e8ffde86a542c603d8b3e231855cb0197e78656a50041a847115f5799a953ad1
File Path: C:\Windows\System32\msdtcuiu.dll
MD5: 27bf5d78440d55c96b906ff3b35fe397
SHA1: db444258c032bbe574523123297982b9dca74b06
SHA256:7477dcae4d2b7c725f86b8a76f5ed35043588c0d7de20282d7fe13fc6d35c426
File Path: C:\Windows\System32\wbem\msdtcwmi.dll
MD5: 849a1b5c53b04746a3d0ecb2b4baf358
SHA1: 598284d20246542f0058eef5c8f046b520159cd6
SHA256:66aedf7abe2e2432a141b615500e415ca336058eb26fc9029ad08ad782c77fd0
File Path: C:\Windows\System32\msfeeds.dll
MD5: ea294c4dfe5b2e991b03eba46d6457af
SHA1: 7d6aea28b4b8a3486881e7eba868a11b51f64e85
SHA256:e08045227855ebfcfee12ff3a165db070e9268122ec3d4112ddacb803dff45ff
File Path: C:\Windows\System32\msfeedsbs.dll
MD5: 70db047e6c6a512c246f4366b7e827e2
SHA1: 5097241bedd1003af09fc12377c845e0fd34e810
SHA256:eb899084048b44c15f6e0799aace9b7bea9e818ab441f7254936c3baabbb91ce
File Path: C:\Windows\System32\msfeedssync.exe
MD5: c80939122eec4c9583a521f673ed8dcc
SHA1: b9006daf6092c3788c0bef9568a66dd93ae54ad5
SHA256:d842c0aa333567d6b14a5f7429282652917a10b449bbab8a79d7f4c4821a5d9f
File Path: C:\Windows\System32\msftedit.dll
MD5: 1dbc9addda3f6d41a4a373a2952e9f8c
SHA1: 1a6bb8a6f32bc4ef5b7608b261f000703e3df44e
SHA256:31f7726c9ec401aa413f2b15d9ecf1204834d5a0841773c092fbde05643635fa
File Path: C:\Windows\System32\msg.exe
MD5: b42553599e40029366a0fd8f81079bed
SHA1: 81ee73e59c1d612700761cac931cd3013215dfb2
SHA256:2bdab404df6e4990bc1fd8f7464dba325fb993c67e592ba1c5dc4f07c02a8e85
File Path: C:\Windows\System32\mshta.exe
MD5: 86f05e66502036db5b678b917e5d5b17
SHA1: 18b5612d05fb0cf28e4976f6b51abc7462bbaf3b
SHA256:b6d1162285423aa7c623fc89492f2f1195de110f054c912f264e29644d65647f
File Path: C:\Windows\System32\mshtml.dll
MD5: 1ccebcf522d7e02bb4ae6e893b3c5b28
SHA1: 1f0dc0011da515e12f640cc3f00778661b6f7a78
SHA256:9b594d001a52713c44df9ec429e1c077b0db8bd29048dac89e0584e4e1f6786f
File Path: C:\Windows\System32\mshtmled.dll
MD5: 11150184d17ed1261e30c2f133a4d1dc
SHA1: 7504e57fbd1c278cf5d5e5addc6c2da3d16840cd
SHA256:26ed4630cd252d7f459902812aa6988798837681d50fce71427956767b984a2e
File Path: C:\Windows\System32\mshtmler.dll
MD5: 9747152741a5ad7b6eae65d13a8ca4b0
SHA1: c004f5303e384defd46ce19d70cbc0791d1c5431
SHA256:b397161c8d255f185c803d696a76665fec84e25f91f6030f511d44d6784ba2cb
File Path: C:\Windows\System32\msi.dll
MD5: ef244e9518d59dc4b09f858afd8bcc46
SHA1: 64194a0a509e31077c9c8a3a8e44d8a4edaf4627
SHA256:480de7c8c2b410f6348a3865226ef49e8ebcd5e71c8a3b955859f3af76f0b3cf
File Path: C:\Windows\System32\msidcrl40.dll
MD5: f15aa34fe2a8dbc0d1c09dc392a9e674
SHA1: ca3e1a3e9cb38785ce4451bfcb5f3098a6ab913c
SHA256:c6dcaa84e7fba1eff59b80db507a05c3f8cc82eb08202d30f4d7b53cbc990910
File Path: C:\Windows\System32\msident.dll
MD5: cc65cbdd4dc7e94efb5a2b10ab159fed
SHA1: 9a80f0e57ae024d0eb57be5e1b2410cd3c2284ce
SHA256:89aa3f8510762c94a276f426c871594aff9eb2cae1e61d7d4aafc46629edea85
File Path: C:\Windows\System32\msidle.dll
MD5: b1c1bb1ef2ac2d739aeaed77c33c1848
SHA1: efa181a1ea01e02cd44614f80259ce794b7a455c
SHA256:cd8d7caebfeb4eb9124ba3e025aff68dde554a8dd6b3365654bf936200c4e563
File Path: C:\Windows\System32\msidntld.dll
MD5: 504e51418d856d664db23dd55a61352d
SHA1: 522c0fb1ed2b9594e7a2aab9481883da57d8ca23
SHA256:f190e142f402de460455ff2d1835294a3e118ba74d76aa092af49372bb9b76f4
File Path: C:\Windows\System32\msieftp.dll
MD5: b936764d2cfeca2dad18721b890d9cfa
SHA1: 5bbfb32c02d544293586b941f12461caf345c362
SHA256:97a3187366eaf87b5270aeeca9273b4cb89b927b11aa73c52392ad7ec281ef65
File Path: C:\Windows\System32\msiexec.exe
MD5: 3a8464f2cecdf1d89430c64237949f20
SHA1: 32b8b2e3b3ecd8e194ace65a5e5052c326d7ccaa
SHA256:8ca4b8b7a2f8e6e7d1df1ae46437fc252cd9c4b78ca3c7adcab721bd0f68b358
File Path: C:\Windows\System32\msihnd.dll
MD5: c7cb09ab0fc1707a72837e4fa16cd8de
SHA1: e60491ef25b51e47519f320667da5dc7bc7e10f1
SHA256:83d1d838d4fb2759c8380219a881a0b51e2ddc9eeea5831e00e183cca322712d
File Path: C:\Windows\System32\msiltcfg.dll
MD5: af9d53c371784598ba7eca8e97d91770
SHA1: 3762bff8dc56d240d9b38b3db30cae79aa5407df
SHA256:ed9c230a1134281307ea4b3a52ea9fbb83ce99d2242160c9921f7bc83af85e48
File Path: C:\Windows\System32\msimg32.dll
MD5: bbfa0236783c5de74a319321ab04f1ca
SHA1: 4b8a375a21a3169747518097617a1acec9c86f24
SHA256:40c7f51d9ec1474f022447d38cbee518e4266dd79aa7587310921d1549876d4f
File Path: C:\Windows\System32\msimsg.dll
MD5: 2716dc8db4379db327e64438ee0eb1a0
SHA1: 058c250403552ac00aa2f4ece93374e5ed025190
SHA256:73378c0916936c9c2938210bf7fabf870c722a8adcd103c4fb7e32311187ce60
File Path: C:\Windows\System32\msimtf.dll
MD5: 0c9fe28771bff1a7aeb741191d05fbf7
SHA1: d3a56614d7b48c9198e9dd0c76c20ca1d824d5e8
SHA256:0e3b029dd8dde4df2bcb101f481c5ac05388e655907e535a87f6277da8569fc3
File Path: C:\Windows\System32\msinfo32.exe
MD5: 66e876997c90fbc812dec7339cca4999
SHA1: e6affe4486bce3604f861fe29fdbd1495d34c70c
SHA256:0b140c168b6fd78117646eefcda9cbce2a81b6b924aedfde46dc84e45ae55394
File Path: C:\Windows\System32\wbem\msiprov.dll
MD5: f48306111fea39b0cfd803fa43254a56
SHA1: c8a523deb8156e92e1b615313c525840e4c794da
SHA256:99c268f7a622d45685844b821a15130e90bfe5e8dedfc4b3362b6be9a331c4ed
File Path: C:\Windows\System32\msisip.dll
MD5: b14eb7fcf11630e1303568f77ea89c41
SHA1: e6f709978af6b257085832de745d6da63d92bd7f
SHA256:a3385318b5890d82a4b6820ef4d90dceb3c0bc3b285c5e11d79b589e5fb5a1b5
File Path: C:\Windows\System32\msiwer.dll
MD5: 77c18cce4139a6efffceaae16ab262ea
SHA1: a9381b58182c65b47e020b98ba47f745a6f37f06
SHA256:8db9f7609dcab4a0b56658d3293c9276d0f44bbd79d8beea1f2064bb36b3aecf
File Path: C:\Windows\System32\mskeyprotcli.dll
MD5: e54d7a9a5e460bbfffdbf869e7c6b647
SHA1: a86a3d2181c92fe04be8928b0a4b8cb6c40c7513
SHA256:b2c2919dc986d837c8012a425e562db517757e4780acb8b6a3f62979bf684c52
File Path: C:\Windows\System32\mskeyprotect.dll
MD5: 06fb52b2b247918c4986c41b8ce395fb
SHA1: 65d082a602530de687aab27da564f7400a19a35a
SHA256:2568134da156e72a4cbb3268e849b77d2584c1e8f63d323d8ed7ede739216f70
File Path: C:\Windows\System32\msls31.dll
MD5: c19717ffa1d92cf12e9c4ce4a1188b25
SHA1: 2bf7951d6788f6385c772c9298192310cb8d2763
SHA256:ac5f7ba620765c326d7a583f96c97ab6000b4836c86e675e1dac02c8b8674592
File Path: C:\Windows\System32\msmpeg2adec.dll
MD5: b6278e45e3bd31d87731bf2680694d06
SHA1: f5d6953cda3beb1eddfd3e612616ffe46dd92861
SHA256:1cb8b89a36761c13d17aa1ac521069bfffeae542ed1a470fbcba815aba2fbea2
File Path: C:\Windows\System32\msmpeg2vdec.dll
MD5: c39db5f5a531185b64e78dcba4ea6fb1
SHA1: ca9e2393d45f673e508f7ea0e847bc93f9586ecb
SHA256:6b06e29a72f966a9dacefb0be13ad83fd857f95d0814c8ce14514dfebc7a0cd4
File Path: C:\Windows\System32\msobjs.dll
MD5: 3b08cf8c34155ab2c3d894fc0265167b
SHA1: 84e5d422fe4133627a51ecbba6175bec12fcd8eb
SHA256:ae6190020c2fb72e36200073b341f01b688fd0563032b1a80b69ea408a9dbdc8
File Path: C:\Windows\System32\msodbcdiag17.dll
MD5: 2abeae2a1a6d1418ed5446c987ce6393
SHA1: fa621da5ee5881d3648f75e617865c181f03a1a2
SHA256:c0e8bb8c1f1eac729d24c51f6baa1bac36bde7a079e877414f9c97f80f368cc3
File Path: C:\Windows\System32\msodbcsql17.dll
MD5: ddb40e01466f8da6b1cfb18a6c091cc9
SHA1: ddacf3197ee73df8496bb325cdb4393256a4e506
SHA256:a31e326eb305faae7601e3a4deba1453dc0f24bc49d0a33e4c64231945985968
File Path: C:\Windows\System32\msoert2.dll
MD5: 16496d19bd88ab50c69fe447f45d612a
SHA1: 78ed507fb596f10c39b8d66f1a374c06b4ff7b2b
SHA256:d03319cbe7ce0b7c24a67a875a780aca4b0964750c41b186daecb7fe1a44bcd5
File Path: C:\Windows\System32\oobe\msoobe.exe
MD5: 5d6b44b5685085decd770c723d5981dc
SHA1: 9b68e167900cc824489f94ae42d01389a2523605
SHA256:f7a5add8aaaef315b86324fbe2cc45c8cd224db2119aabe0d5c238a54e28e48b
File Path: C:\Windows\System32\oobe\msoobeFirstLogonAnim.dll
MD5: 92689c94db73aff8ce6d6095d3af30e9
SHA1: 7631133e9a0918df0c267c3843b6f26052236410
SHA256:acce89a98c6d2a0f80ea4d8fcf62a18b1c07f965bd2664a7812e732079dec17c
File Path: C:\Windows\System32\oobe\msoobedui.dll
MD5: 1651662aa6e6d82bcfeb0e4f0b6d38ef
SHA1: cdb28044dfecc6978c400ce1bc7f0266fbb3fd5c
SHA256:0686463f7a05c2f9e357436a029359f211e18dfdc161536eab8849ad5e85d635
File Path: C:\Windows\System32\oobe\msoobeplugins.dll
MD5: 6c40e649ffb4a09a0f93827080b28769
SHA1: 87aa347046c19f55a5bc5c9d2f5506d5bf0e8caf
SHA256:33a2e4ab94ef99a663560a5a6a587fcb208fbb3bba41e4b632885518da24e154
File Path: C:\Windows\System32\oobe\msoobewirelessplugin.dll
MD5: 087da5ad7bb89717ab4f5ae47b058aec
SHA1: f84976a9e2bbe2afd9262e3723ed5885d7325359
SHA256:a15874dc418b9cb01f4c7083868e676b8ea14cd2ba16dbae7bea87b4223bce1b
File Path: C:\Windows\System32\mspaint.exe
MD5: 7fb20e4224adbd578f4210ab228d640d
SHA1: 205a5025685e9b81d6af8ed7aa03360624cd55e1
SHA256:72905f8a46e86d0a2e391fc1e6eb2e4a7ef6af37ac00b3340edd10144aa7e0cc
File Path: C:\Windows\System32\mspatcha.dll
MD5: 679392b8700bb74a48b2c80bd0885af9
SHA1: 423d10063a53a34d82848f73b2b087c7e6079d03
SHA256:4d4dd1b5507e1200a0285216417d14f113eeefd3cfd26f0c740b9e58a0facdef
File Path: C:\Windows\System32\mspatchc.dll
MD5: e22b04e7cf4cb8bfca95c7a373a35a93
SHA1: 8597ff0048544a771ffb2c08a7c817e4bea0e5d8
SHA256:4dab8cad76bcd7fb4d8d7c27fc96e52182f6f5e80cf7896c07b01817636f698b
File Path: C:\Windows\System32\msports.dll
MD5: 5d89b4b9781677da040d8d1032e9d9e9
SHA1: 492aa4daa689da95e69cdc5e9f29586ee84097f7
SHA256:93247247d9c3a7268c0638ecca1fdf31a161e028ad89e9dd5d71b97131113797
File Path: C:\Windows\System32\msprivs.dll
MD5: c478dd12b3c32e27dae46a3e2dba5d85
SHA1: f3f640cf779c7901adf55844115f02d8c951675b
SHA256:bcf51507b50e6d367137fdaaa471f5a08de3b398302b42fdea02fd7d00a487c7
File Path: C:\Windows\System32\msra.exe
MD5: c1ee1a0564caaa5f0ee386f65bd710c2
SHA1: 043166e9692b0a2e22bd45f53fe555ced021ca8e
SHA256:46694f2bc9957716402846e4a05b6495cc0b2ce1ae461416fd18035578fc91df
File Path: C:\Windows\System32\msrahc.dll
MD5: a03cb5b9651475849d5778341c59bec4
SHA1: 128ca5acda28aef64dbdc3c0939e48d23ffdcd26
SHA256:8a52815d8b976508251704dec20fe5e358b84ed442041c9b28fe1d4ab1b193a5
File Path: C:\Windows\System32\msrating.dll
MD5: e9c2fb0507a8d8f478030cc4758d1dfb
SHA1: 495b8b44ef999b446e090396d7253d42e7715d18
SHA256:d83a2e45c5d59df3e1cddf1182ac32114425759e93709fcd5360e572af079773
File Path: C:\Windows\System32\msrdc.dll
MD5: 73891e4c53b53004295b9d724660a0ab
SHA1: a30d7dcf35b8b8e8ffb001639ce6f0f4c405ac02
SHA256:f4c02ecc3ece4b9496bd77d52c2d0b05cbd3b7ad3dce15902834e368fe1ba422
File Path: C:\Windows\System32\msrle32.dll
MD5: 41ccaa3f7571324a1f29311daf6d002e
SHA1: b4b30bcb8714b4b03d923441f76ef42948141092
SHA256:2311837868254d225d2b2340b03f621efa4d7d0377c2da8052ff4ba513543928
File Path: C:\Windows\System32\msscntrs.dll
MD5: d28bef82504ee78845c00e2b06439b5a
SHA1: 39efebe4022672c3e166f0ce8a305e16b17c2d0c
SHA256:d6dadf9da9c6c1faae39ad221299a6351db74454682b4b2504f1cba208e23f30
File Path: C:\Windows\System32\mssecuser.dll
MD5: e27fec1586258049de6b294544af52ee
SHA1: 5685869401e5ee1d5d511c612e83139826bb1f72
SHA256:fc1c60f1277e5c77d12b0d64273d953f93d611f1abb5c67ca89f27dddbf32510
File Path: C:\Windows\System32\mssecwfpu.dll
MD5: 469f7c8c745bd9c5cce499fe62b4fa4b
SHA1: c8340f5ae2fb678b4e8cc8713daf92fe8a581028
SHA256:0209684d196728010cb498afbfe3d54274452692c98db46006fdcff9689e59be
File Path: C:\Windows\System32\mssign32.dll
MD5: b37f89a11f2c2cf45205ea7625600cef
SHA1: 4839124f3c11e183b92ac0045ba1789bdf21b01a
SHA256:d8632345802607314f5c4d1fd05c82181321b2a0ba7f355735f61be639ae6a64
File Path: C:\Windows\System32\mssip32.dll
MD5: 627b37e85aacf23d6302b81cf976e185
SHA1: 8fe60442580e8c8d470875bd2e36b87a0032142a
SHA256:1130d1bb7aeba82fcdfce37833407ff54639812c44d16923864545b7a8ed96b2
File Path: C:\Windows\System32\mssitlb.dll
MD5: 6e4f271925bc551577b61c9228ec608a
SHA1: 6f3f1537def043e2ce2dd08597883258402b3129
SHA256:8c6fa7dddab2ba504eca97558b59f7e019f818be4a79ba6b4a3cfa20b20a9694
File Path: C:\Windows\System32\mssph.dll
MD5: 01060bb3a85738a1722c159d006fde8c
SHA1: 25a6bbc97fd0612f298cfbb8df7c15567a5ce932
SHA256:72dfca3c9fa6f7015b09aa73c4677e1682841a9e9947762b8bd4d265493ece30
File Path: C:\Windows\System32\mssprxy.dll
MD5: 775f56ecbd1f05c5503d92419f257e41
SHA1: 9b1abea63b929bc0ff25fd2e8414da622518aab2
SHA256:ef666847a8192da4bac3d4a15c880e297be8e0461d2c3b061e3e3c7c69f26e0a
File Path: C:\Windows\System32\mssrch.dll
MD5: 90084e347b0bec86461810582ffbd1d6
SHA1: 866c2df19b9de16dab2bb846e58b071c54731468
SHA256:2e5d8f65c9d6eaa87dfd1b050bd72c747789a5a1b71775aa36bc8900eeb6ba1d
File Path: C:\Windows\System32\mssvp.dll
MD5: 56ad1b4cdd41416f1d9bc1d81a7e52af
SHA1: 6314051cc155a3952fbffee696094d3d8073a849
SHA256:0c67ca9b6720180a179d616422566554ea34498ecda493ca41eb2f4a4f511ffb
File Path: C:\Windows\System32\mstask.dll
MD5: 8f886a28820e6127d402aaad36de77e0
SHA1: 9011c75d630d39654c669533c77f88c274691e8e
SHA256:cf4680fad8c0560d8feca583a2444eeccc7c8640f218d02b42c3c00a554d3ec6
File Path: C:\Windows\System32\mstsc.exe
MD5: 41d6de6ee64eaf5530d6c4b5a5cd6ca0
SHA1: 7466b233ba6bc18e732326be83bd4e019abe6f0d
SHA256:2050323389b1dda6b728bb382458a48cdd380ce0b34ce8b889be3ce8a797bce9
File Path: C:\Windows\System32\mstscax.dll
MD5: 1b03f78c27e3f8508c67afa2d03ff537
SHA1: 00fdf00bcbd27116fe66622f057c0f95d4b515bf
SHA256:a56d5f323522fa2bc7028714901b999a0a0b9f20dbe90b27a7c8c07b6eeec127
File Path: C:\Windows\System32\msutb.dll
MD5: a06b27847951cea1d44b86c1bade5fd4
SHA1: 40e20acfb49a8c3625733ff18edbaec36113395e
SHA256:51862691aff5c96684617e99357980c84773d698f3a6a0c195f3b4c3f3673a7e
File Path: C:\Windows\System32\msv1_0.dll
MD5: 42b56e81a18ece7fcd1f3d02fe397165
SHA1: 84e89ff3b0274431508d8ac40701550421edf1c8
SHA256:3c7466d9cf662d3dc6e6d2306053ee3bb0b699999929e003ce24ceaf77dadce3
File Path: C:\Windows\System32\msvcirt.dll
MD5: 224149eea3977b97136bff4faf489bbe
SHA1: 71d8d7bbc0bd4a0155f89695b39afda35705374b
SHA256:12ca4e224145ace98028cc85e776cffa24af8bd6a26f20b47573f2acfe62adda
File Path: C:\Windows\System32\msvcp100.dll
MD5: 4f096d96285e06cd51aef7d2d3de04da
SHA1: c90ef0eb5b1a0b1b85ad6792291747fb6307dcdb
SHA256:5bb420fbe28315f2117376052bb8488ce84a3398dda65005b8ae1f792017e9a8
File Path: C:\Windows\System32\msvcp110.dll
MD5: 7caa1b97a3311eb5a695e3c9028616e7
SHA1: 2a94c1cecfb957195fcbbf1c59827a12025b5615
SHA256:27f394ae01d12f851f1dee3632dee3c5afa1d267f7a96321d35fd43105b035ad
File Path: C:\Windows\System32\msvcp110_win.dll
MD5: f388d6d87d9c68a86bf7ccb0dbd3d457
SHA1: 56a1c6c92d4139abfe149bb482465651e17f15ac
SHA256:a6fdf765b9a9c422360903af7ff6bff55129aeaeed305b3d14445a486d32bd52
File Path: C:\Windows\System32\msvcp120.dll
MD5: 0a097d81514751b500690ce3fc3223fa
SHA1: 7983f0e18d2c54416599e6c192d6d2b151a2175c
SHA256:e299b35d1e3b87930a4f9a9ef90526534e8796b0def177fb2a849c27f42f1df2
File Path: C:\Windows\System32\msvcp120_clr0400.dll
MD5: bb4477c9e4032fa06991fb3210b4c668
SHA1: c3e4ff53305803e1f1630685705cf9b2c2069016
SHA256:9e5a0ca1c2b0344704409728db0f38237befd7f4b5f67fe7e9924fe81cb1596f
File Path: C:\Windows\System32\DriverStore\FileRepository\iclsclient.inf_amd64_75ffca5eec865b4b\lib\msvcp140.dll
MD5: 4d0a8e53359763325e36847563d865fe
SHA1: 886febd1cd7f1811008f8ff0608c2dbaad0c3280
SHA256:fd2409ca972da9419a68f3f42244c73b4385febc38b7352f1bedf77f57dda323
File Path: C:\Windows\System32\DriverStore\FileRepository\iclsclient.inf_amd64_e936ad8266d026ce\lib\msvcp140.dll
MD5: 15751bfe731643e4cb5ccae360be9dce
SHA1: 5e36d6e1177bdf0c7ecd912d428a88ba47edccc8
SHA256:3043e292ace031a4164a52f61238bf89f1a085e485d4d8c72cb484da260a71dc
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_01d078da8c0f4900\msvcp140.dll
MD5: 3bc140d2e4dda205f303446f66776675
SHA1: 67a6cb3d3b49149702959a7f62b86ca17002c403
SHA256:3cb10710c857b2ac1c28ca161ec03cac5fc93a08d29e9cf4dfee244d7544935d
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\msvcp140.dll
MD5: 418a9c05b89fc1df67e5440504b4f098
SHA1: 1d61d5a812f66b9be76745c3e65e2f09d31c7913
SHA256:5760f39467c18a979139e84a25c5d030400bbce3cad3bbd674b5e66c05e4a016
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_fdde6ecd49c3a98b\msvcp140.dll
MD5: 4b8aa414a153555258570a8ea07ca241
SHA1: ff628d4f9643cb61e18050140c1d2bf5418f07d1
SHA256:05a4b9742296eaa7a20d78dee7fa6f207f010aa7a0f0f79d4afd0042a764dfca
File Path: C:\Windows\System32\msvcp140.dll
MD5: a62a22c33ed01a2cf362d3890ffa70e1
SHA1: ea3f55d92cdcb788876d689d394ec3225b1d222c
SHA256:003da4807acdc912e67edba49be574daa5238bb7acff871d8666d16f8072ff89
File Path: C:\Windows\System32\msvcp140_1.dll
MD5: ae146db58039e40b9b4bf1c6fb973d07
SHA1: ac0700813a2974f6d5b91c37ccabfff0302d7be0
SHA256:a61901a4d719a3e1cc4fa8f629218571330331e8dde2ef1f05c34845b180928e
File Path: C:\Windows\System32\msvcp140_1d.dll
MD5: 65cb0b9e7911406d06bfe000adb88277
SHA1: 233d9c4b05ec88f4f0f65d86e07da25b61a52e7c
SHA256:2eb305f82bdfdfa12321be17b996cecae907782b70348f8f5a667e9efed48a15
File Path: C:\Windows\System32\msvcp140_2.dll
MD5: 9a4033b3ba1bec07d20bc30abf097222
SHA1: 979c97d5b0f4d83de7671d018b96aa850e9d94f2
SHA256:3d15cfe238ac1863bbe65501f05d561162f28032b80f2c8d9a1fc7b22f8445a2
File Path: C:\Windows\System32\msvcp140_2d.dll
MD5: cdfba93e783c567c0035293a81c68247
SHA1: f0665cdcf91527e83b5695f6a9cfaf1b77e33062
SHA256:f62dd3f1b6a45765733dde54595262c67f0c4c00f073dd0682cf31778b38e2ab
File Path: C:\Windows\System32\msvcp140_atomic_wait.dll
MD5: b7f657c969f7b087ea2563c02111a3b3
SHA1: a23917a890e7f0e1cd4410a9b3b6368367bcc6a5
SHA256:0fcf613254644c2ea451a693d7737741b8041f11decb8feffd3b34e00220620a
File Path: C:\Windows\System32\msvcp140_clr0400.dll
MD5: b9b2b83f9aa681d22e57d63b3bcb2f28
SHA1: af235750fcb209d53136869f18e43ecd7eee3f58
SHA256:8a0468a75a0958864cce1da6cca8595d02329729106c9a676e58b2dcb55990b1
File Path: C:\Windows\System32\msvcp140_codecvt_ids.dll
MD5: e1dc3a47683149440eff7bf26bba7832
SHA1: 36336542e3e2cd63cdb26f97596a7df50bc482e1
SHA256:a714b498ab7b4b0508e69f66ca15196df605844d4d6d5e43969a5f1fd7d7e9e4
File Path: C:\Windows\System32\msvcp140d.dll
MD5: 64799d76705835958b5e5478bd4622b4
SHA1: f1cedfd22f5437df266ae3ce88f276b5cc1ae1ff
SHA256:6ce7aa963992e41e46f255737bb4ca71ac97065ef52283341a02024443536356
File Path: C:\Windows\System32\msvcp140d_atomic_wait.dll
MD5: 7e432f65d92b0df41a4390620d92474f
SHA1: 90c7312b224b579e4d2f11423f656d85e54acf64
SHA256:41a397b245663bded8b488983c6befb4583b00d4644a51f885366fba1c7a2652
File Path: C:\Windows\System32\msvcp140d_codecvt_ids.dll
MD5: d9ab89cbf28f4b5d658cbeb2af9000ad
SHA1: c2a710f1453e3e595bda47d61e6557ac33236e51
SHA256:bc70f4e4b5563cda0ed203c76e3dc26b881b0268b52afc9a1d1078aea33af23e
File Path: C:\Windows\System32\msvcp60.dll
MD5: 140504ca78880413dcd994f7076c160e
SHA1: 7a7376a53936c8a7933d1dd70a14d9e0286a402d
SHA256:2daeb4cd63bb1fecc420a46f3ba019797a3a14893d5c2ed4edff2b34dba4e6f7
File Path: C:\Windows\System32\msvcp_win.dll
MD5: ec9f1cdd909f7c0bae4db21dcd2033de
SHA1: 4c2a112e048fc75cd4c581836356e881552c9be2
SHA256:2a7825c2925347e0cb767a0dcb611f3eb80d0f71cbec981069b227bdc7cb871a
File Path: C:\Windows\System32\msvcr100.dll
MD5: df3ca8d16bded6a54977b30e66864d33
SHA1: b7b9349b33230c5b80886f5c1f0a42848661c883
SHA256:1d1a1ae540ba132f998d60d3622f0297b6e86ae399332c3b47462d7c0f560a36
File Path: C:\Windows\System32\msvcr100_clr0400.dll
MD5: eda27824b7652bca80b3a8daec225c77
SHA1: a5df453afbadff9fbd6010be0811b086818b12bc
SHA256:4444e2ea18498730887db9f0fe2283a9f8de34e213953b776508f47583c72926
File Path: C:\Windows\System32\msvcr110.dll
MD5: 7c3b449f661d99a9b1033a14033d2987
SHA1: 6c8c572e736bc53d1b5a608d3d9f697b1bb261da
SHA256:ae996edb9b050677c4f82d56092efdc75f0addc97a14e2c46753e2db3f6bd732
File Path: C:\Windows\System32\msvcr120.dll
MD5: e2ca271748e872d1a4fd5ac5d8c998b1
SHA1: 5020b343f28349da8c3ea48fb96c0fbab757bd5c
SHA256:0d00bf1756a95679715e93dc82b1b31994773d029fbbd4e0e85136ef082b86a9
File Path: C:\Windows\System32\msvcr120_clr0400.dll
MD5: 99e982747b36af703209b734d9d05263
SHA1: c889d6646d7c33fb108e2719875c5f4c49a6b0c0
SHA256:17e09579c756d7374dea79969bab36d3d9257d4d51aa1934d2db1be374d9a425
File Path: C:\Windows\System32\msvcrt.dll
MD5: ae02a1e372952134e967b336d2dc1822
SHA1: 7a1fc1113ca908cfd2db55948634cf1949cafb03
SHA256:a7f4196d9476d36894ce17c3b0dd97504ca2cc31b3e0a774fee326e867565885
File Path: C:\Windows\System32\msvfw32.dll
MD5: f3354260c4b1383c586da9affde33d6b
SHA1: 2b911b3c59cc975fa081b88d4de21d345841dfb5
SHA256:7e09b985d0ce2e6cab125bfb88ea3f3f85e9de065bcf2c140c7ba6ca82ad5dc0
File Path: C:\Windows\System32\msvidc32.dll
MD5: 6ce2b64afe92d892974b233db91f9433
SHA1: 301adb5eb18fde51af0274c2977a755b317b3fe5
SHA256:da163edd62279ade83f461be149027e940ab999b639dd6314d95eaae0a93f917
File Path: C:\Windows\System32\msvproc.dll
MD5: 44b169e4508b867a29128d80f23ea7d5
SHA1: a22b2e618d0cd97a41b6c5f63153d8e93ee813bc
SHA256:c2c944d195adf6864afcc16dd93fd70a91c79f8c342259d429099bc070ff96a3
File Path: C:\Windows\System32\mswmdm.dll
MD5: e1685525bcc40aecfc102f4d9ffed69d
SHA1: fb71adb0101138de841480e9d6f36e374cab015a
SHA256:34a9c37131298c690bbc57fb204753667e067a678bc8040b52409e657dde97ed
File Path: C:\Windows\System32\mswsock.dll
MD5: 22e239a214b32fd30e5b587cd3ee5fb2
SHA1: 6d4177102f97b508249f9c1f5cd0c7c69adbb400
SHA256:f68b470ca169fa54c1315ca929f083ec956e6c4a84e87717a503bf8987fc2611
File Path: C:\Windows\System32\msxml3.dll
MD5: 619c384806812329bad2086685564340
SHA1: 3d258e6b4ed691c6755945c55de9bf0beba66fe2
SHA256:5b5de27cc3421788502b6018b55e5ef82de106881393ef8c0b6d2af250b02256
File Path: C:\Windows\System32\msxml3r.dll
MD5: e4b1fa05eb042121cde67b11ffcb9388
SHA1: 300d1814f78725e2799eafa549012ad2763a7b79
SHA256:dcbf9db53a272510255a7500614933cee21165e1960ee149de2267152034b093
File Path: C:\Windows\System32\msxml6.dll
MD5: 545a0575c1b1caf6b681f4dd9ac75e84
SHA1: ac78d1ad44e494d838c7f8e4d4437cc9c2b8c62c
SHA256:1bb75d1eddd78915238e145aeabdd6ffbc789d6325fb4280dafcf42ca26e7667
File Path: C:\Windows\System32\msxml6r.dll
MD5: 10164af8283b68be7d36b39a21905b98
SHA1: 9cf000fdd30a2caae98643d2f2d9f9b49bb9a20f
SHA256:b2c61d2c3f280d3e426377d299eab562e9ecbcdad3b29f4832fbf80c3e26c42d
File Path: C:\Windows\System32\msyuv.dll
MD5: 29e343d48791a239499395ec49dd7e22
SHA1: 91640bedd8ea9cf6232bdb01cd55f771329dea9b
SHA256:117c431db0fb66db952e8d4c29226d34d8e7462cd65acbcc84b7d63be3f5b942
File Path: C:\Windows\System32\mtstocom.exe
MD5: 963d599f73fe512dcae1887c9fedd346
SHA1: b3a3c22ce3b3560403407cf3f59d64368b457296
SHA256:66479fca0dc380ecbd62bc55a75c2ab5b33fbf3d2119c47748fbf3a3dd3a0954
File Path: C:\Windows\System32\mtxclu.dll
MD5: 532345f422005b6a120bc671659d773b
SHA1: 523d4ed86ba7b873fa2c5c4d57982051f189e43b
SHA256:a362b3cf0440c38385bfb54e14a3bee0cd45b067d6806c97b1c541c3bc38cbd9
File Path: C:\Windows\System32\mtxdm.dll
MD5: 8ef4a48cd7a410771160dd2bf3fe5745
SHA1: 53b57fcf1f6fc7370803f109de523e155dac5baf
SHA256:8f88d3ac38a38ff107f1bea0206fa2b6bbb2407ba100ee1837d4ae8c9e06dbc8
File Path: C:\Windows\System32\mtxex.dll
MD5: 7ffe002caddf22edd4705493f8aeda85
SHA1: 75a7b88427d65c741914933cd24338bdefcbbd6d
SHA256:d9d015fd7de211bf55bafed8d14063b26b6fd8be16023ac9facf98d496937b2e
File Path: C:\Windows\System32\mtxoci.dll
MD5: 753bb0dcd50e6ddfb967a3d93c1d3a52
SHA1: 6696dce60de86bfd7bc2f5e48ed63fe669c30d57
SHA256:54b35ed08f8f2db310f89646825f9afe399869628d03a865377089c13088066f
File Path: C:\Windows\System32\muifontsetup.dll
MD5: e0ff8c2bfabc64ba34d1b1111cecf4ee
SHA1: df0456b0028dce83d170b9e4cee890585f217dff
SHA256:bbb101e7f0183fd9e6bc991a55ab2348c061c1e2870ef27212d301ef575592c4
File Path: C:\Windows\System32\musdialoghandlers.dll
MD5: 8df91c71e0b62007a6232d0d9ba05c35
SHA1: b86727a69ee56b662a84fc298d980ca595807f0d
SHA256:9d803a9b79a09c39d6af696329195c839a31e9c13d9133d24736547104144dd4
File Path: C:\Windows\System32\DriverStore\FileRepository\prnms001.inf_amd64_8bc1bda6cf47380c\mxdwdui.dll
MD5: 91124eaa5529392022067abfc2505611
SHA1: 64b59acc23f73a91d7c4e82ed79f239bca2f5fc8
SHA256:d13483308389c7acc314c7dd9625f837779e26a6a24f52939e64aae5ebf500ce
File Path: C:\Windows\System32\spool\tools\Microsoft XPS Document Writer\mxdwdui.dll
MD5: 1666c8c489d4c4646c8150583c33a236
SHA1: 9588287b32882f999ea26b198057645ad5439dbf
SHA256:4538e58c32aa192994b10dce6f8b2aa749e4f174c97181ef43e05394f8af61ae
File Path: C:\Windows\System32\mycomput.dll
MD5: cbfdc01c0fa0b9e62be17fdde057fa3b
SHA1: 7dc362a4e3ad763c6477d4fec6b8e6bdb02b632f
SHA256:a77933e00777bf9ba0bee0bf783101142a006f76a25cdc02e8f4e2a5b7aa5ceb
File Path: C:\Windows\System32\mydocs.dll
MD5: d52a54ad3460c1e8e54f1206c7cf14b1
SHA1: b0a380fb4eb15568fcdcb60f3519a50f024d42fb
SHA256:ec0efed2b7b97de6733d4452f5af20e2b91fcbb5f0ab895385e07ef1d826b67f
File Path: C:\Windows\System32\navshutdown.dll
MD5: 5c091a2f7f248d99a4f7315e2ce9b6ed
SHA1: ba67bdedf4934e6c3d07d08331038ffc9828edea
SHA256:f69755a6d6763295150118f0247c4eac244964342e89bc48870dc1629f8cf4ce
File Path: C:\Windows\System32\nbtstat.exe
MD5: 004091b8024936ff322c11cf370f2184
SHA1: 8208fee26d92e661a8f65a721b272ae931bc7692
SHA256:6210fa6ade115dd07409cfae21683b1772d6d3fdb6b438814cacbd3588dad9e3
File Path: C:\Windows\System32\ncbservice.dll
MD5: 866098274af009f6955a9365b1215047
SHA1: 511636b9fbbbaff757c12acbc741089cf7a50b10
SHA256:737862db9e2d4158661c94d705e16c88c25b37b01960c69c929005c25d4a5f51
File Path: C:\Windows\System32\nci.dll
MD5: 6ae9bd5136aa567e2f00e3df914edcea
SHA1: 85b9e6f9e70f552a5af3607a82f4067bfde91679
SHA256:1fa46cb48a7e4fcc580f2cb88c348a67721a5e8d0a54854d97e7d212e3e0b967
File Path: C:\Windows\System32\ncobjapi.dll
MD5: 241b7a0857bbf9270c41f319755702ef
SHA1: 042d1ea7a839e5571dedb2a0f53fac7ea6ef85e1
SHA256:e848994a2efe3609de7e378d37e7aeb961804e0d12393e389c050add0c88fda6
File Path: C:\Windows\System32\ncrypt.dll
MD5: 7ab590da95ae70a26123eec00fc69fae
SHA1: 75f6b510b94566360053a8f05a82fd0072c028ef
SHA256:dabb5b5a32cf17e4d70c4f8e420de0443086e5f25e6b23354cd2b9719fee1001
File Path: C:\Windows\System32\ncryptprov.dll
MD5: 404e77cddb39f7e1ca0cdfe830d62178
SHA1: e782f5044c7a0750670b44435a986d8e311f007e
SHA256:459f124268354455abb0b3014a0e33a7b763d64250c3f4462c72663cc7fe99d1
File Path: C:\Windows\System32\ncryptsslp.dll
MD5: fed2829ad73fefbc50c92ac084368b64
SHA1: 6f3e768c48af6a46436ff56dde85c2e48544dec2
SHA256:0ce219e4184347f6050cdaa420620280d27d30920121df81f5fb62537a71a915
File Path: C:\Windows\System32\ncsi.dll
MD5: b32ee59962648669110629caa82bc754
SHA1: 77e851592296b5b40002cbabb3c9eecf2d31823d
SHA256:805e72383447f567562d8b5b85f3e6ab56b85c61c7c4ede12d56984f685d7b96
File Path: C:\Windows\System32\ncuprov.dll
MD5: a764a623ac9d341e6fd67efa88298f69
SHA1: 6393b8a62120b18b7ec895ada0372a95b21f801d
SHA256:f1c24dd350273ba1745369695f10957f5ab6d303e72e8c80d955b5a26f1295b5
File Path: C:\Windows\System32\ndadmin.exe
MD5: f69424a90cafd6a06ceec8beb35050e6
SHA1: 6c69b958650484c4c5af4dd48e9d37b2cc6ca8e4
SHA256:b042a65f312caf6151fa6419d1ec9e30109df9a9cc5d96e9cb6e0f68a1fe0527
File Path: C:\Windows\System32\nddeapi.dll
MD5: 1c054cd03325fa2edd21911c5dd0200e
SHA1: 94a657ae4d402ea95a5c50b78aaf6c7c8cf848c5
SHA256:f814bf38ae4f27451bb94ed407e4d686b954e603a1419eb9b8defc79f69627f1
File Path: C:\Windows\System32\ndfapi.dll
MD5: e622ae7e7f3dd4d5cbab7aeabe9abff8
SHA1: b481981ad57fafc62eebb67f0a54027602b34bfa
SHA256:445b0f9782a11d6f2e75d186442aba5a10d34a73912b96ce012e2f4beb4ba0ff
File Path: C:\Windows\System32\ndfetw.dll
MD5: 29cafceb6c8664ac063ecf35408eee2b
SHA1: 9e4ccc46e0799df622041e17d74b5f2ba923fc6b
SHA256:4b316abddbce5bf9b1ebe9aaeedf24fc34a165697dabc5ac954fe6899cc28337
File Path: C:\Windows\System32\ndfhcdiscovery.dll
MD5: 743dbf86801b289f1fb250e070ecc817
SHA1: f1a6ab1b5ec3cc8f05fb18dfdefd3a52e2ec2347
SHA256:9717ff62545840d4b2e6381dcca097a541fe933846c33149dcb4609fc1973362
File Path: C:\Windows\System32\ndishc.dll
MD5: 74944c79ed469aa8950d2aada015c075
SHA1: 8920ec67749818155f7460a751fe0dd7ff36926d
SHA256:1d8dd5b6ffcf8da90d0ac156e88968367d784e9edb373dbbdf0270a8adbd91e6
File Path: C:\Windows\System32\wbem\ndisimplatcim.dll
MD5: a8b13716ec24f7f242ac7db3c619cfbd
SHA1: 577f3408bfd2621b3740607ea2df014ae93a8dea
SHA256:a96f317c80c28dbe8a8d6bac5898b0db6f018af48f24388b4caf91681bb35c96
File Path: C:\Windows\System32\ndproxystub.dll
MD5: 4618c76d9dacbaacbcf1502764a6da2a
SHA1: 613169a30c8bd85e27aad26cd5d4286676f75497
SHA256:906b46ea08ae1c93b7c2c1168aa1e9f2a612b1100fe106d7f2b8fbe0debb2272
File Path: C:\Windows\System32\nduprov.dll
MD5: 34a4af20a1c566b7b38701a3f732b90d
SHA1: 29b2f9a964067e97f5d1d7bffdc00c70f34dba66
SHA256:2c7e627fcb5306ab8fe6a9f484f268fa3ec59c1045270ced0a1b565d28574784
File Path: C:\Windows\System32\negoexts.dll
MD5: 9cfa84be2a6be5de4936440592710d6d
SHA1: 60f0e81599918e64572de4839c5f102220c8adf5
SHA256:d41c43512a33e6fd56ab7acd998c4127e31ded730495057083481d5b89b70316
File Path: C:\Windows\System32\net.exe
MD5: 0bd94a338eea5a4e1f2830ae326e6d19
SHA1: 88b101598cc6726b7a57d02b1fa95be1b272a821
SHA256:9f376759bcbcd705f726460fc4a7e2b07f310f52baa73caaaaa124fddbdf993e
File Path: C:\Windows\System32\net1.exe
MD5: 78e53d5ae8839c58fa40bea32b775999
SHA1: 886622877afb2f110abfaab79c107119a7e569ab
SHA256:e62071aa18768dd88acaf97fa7b1f2fec9fcce89736c1ee9a800699328d196ea
File Path: C:\Windows\System32\netapi32.dll
MD5: 7625f0f8e269dfa43ad7583e2939d924
SHA1: 9c631a495d948feeacee07159e3be8ccae110368
SHA256:29a7485f79fb695c0f87fcfa170eac497899916d337213be20dc6a0652b8dcf2
File Path: C:\Windows\System32\netbios.dll
MD5: 50f5f81e66ef229ffbf0fffbc5c4d105
SHA1: 55bef93005f7e5b21f947bfe3a2e55f1b99c73d2
SHA256:c9782319e585f7dec0f6a9570c54494c4f1fa7b3470b6630e2bdc6936611deb9
File Path: C:\Windows\System32\netbtugc.exe
MD5: 79aa5895b3dda2a4b95a465988ee2237
SHA1: 0d886bec498f43b16168d9b645a820def347ffec
SHA256:d9fa2a1b15920cf84c9fb6eb8f4955a3c8d339485e11472bf286cffd55627067
File Path: C:\Windows\System32\netcenter.dll
MD5: 169d5eec2111cb160f5cdd5f7c70f986
SHA1: b5601c6974b2563c8c84f19092b8c848435fbb64
SHA256:e6acabde291d8a909806a7de54ac90d5cf06a1340ad4941cbe5e8deb2292496c
File Path: C:\Windows\System32\netcfg.exe
MD5: 01504f3b8b252f5619c94fd65dc52842
SHA1: 864612baa46728b9605a38262486ab4f4d36e1b0
SHA256:ead06f5f5eb67fdf1ccb25511d6d7ca38ddd307b4499274886e04bec53f1c76d
File Path: C:\Windows\System32\netcfgx.dll
MD5: 9e2421147f918238c3d2ca8b7db4ff1f
SHA1: b4c07f0777d23424d8e61c54b9f8bfffc5824734
SHA256:e5b26a775b920e2cd5ac602da6eec5c1d5b50e7eccc56216fd75868491395f20
File Path: C:\Windows\System32\netcorehc.dll
MD5: 547d10ff730fa1f711b361f6eddc45db
SHA1: eaebb83c37bb62e55cbee29e5c1021af50ebe47c
SHA256:0a46eeaaa56da2940da3a8df8e12b885f08b91d2185f4efd9b59851161d44af9
File Path: C:\Windows\System32\wbem\netdacim.dll
MD5: a28ed497ffdb4f5faf78346a77313eed
SHA1: 3250e8da2dd8e240f90100a9c149c94472e3f75a
SHA256:970ef32b5d788f41a7770533fab79c70c4eddfe66dc3bfc173687b3d0d3d80f5
File Path: C:\Windows\System32\netdiagfx.dll
MD5: 15e681e020db0a43654eb7bb1d7f09fd
SHA1: ac64433dcb55b5ecab2aea34ecf5670ff56a2345
SHA256:242dc87687cb8ab504e6142c77bfea6a11cdceafa05aaeafd541535e5cc2d46f
File Path: C:\Windows\System32\netevent.dll
MD5: dfaa9bd2f387ab5de6328cf048b5f761
SHA1: 58445a5b5fd9b146ad590679113bba909f27b4bf
SHA256:8b82b2a6881a3116b921863c7ea1eb49220e5765ccb87826af0f39fb3685da64
File Path: C:\Windows\System32\netfxperf.dll
MD5: 00c44376ac7bfd78fbdfb04c64049fce
SHA1: b11d7a4d3ea8563af255f964a6a386047fde1830
SHA256:38c384c473a5d9e89f933b0df676629e2ab79240a0c84f2a78f40e50d87ae2c9
File Path: C:\Windows\System32\neth.dll
MD5: 26bf659dc283cd389baad0ca54c1abca
SHA1: b386c4c9400880ec8315a93af0c5b38db6be9abd
SHA256:ad2310e7f3ba73c29872a14826f6a5118765a4c6b67a57168a336c05365dd152
File Path: C:\Windows\System32\netid.dll
MD5: 03998aab23ff977a17497ad326e8e24b
SHA1: b655bb0c22a4dd6db43151c93426faa630052283
SHA256:d8c4537350c92a04ee267d2524e4b25bef732e83d32f68f387001dfd6472758d
File Path: C:\Windows\System32\netiohlp.dll
MD5: 6e26a5cc93d8d96ecb5fbebcaac6712f
SHA1: 0c50a8c9ffcf15d0a8a88fb56c7c8b2493b0dc9a
SHA256:e36c4a49471f6fc9ce86e1c4bc2f07d6f789e84874c53b41fee0df3c212c2f4d
File Path: C:\Windows\System32\migration\netiomig.dll
MD5: 5ad03e4e95d18c1f1151df397a5681f3
SHA1: 622095d2899f401e6176d0c478a63c6b31ca4541
SHA256:f21b6041dbbedc0405f7d95f6f688136548974f80003370204c24885c783d395
File Path: C:\Windows\System32\netiougc.exe
MD5: 4a21f26a50cab9e1fc786d4da4fa6f8a
SHA1: 77a46def12c5edd4dd3251ba68304aee745639b9
SHA256:277fcd09d99de2a6b9cd3e6d0fa32ad545e067b72477f7aae95a06c3762768e9
File Path: C:\Windows\System32\netjoin.dll
MD5: 73d12369abea10cce3cf3d40ba2fb489
SHA1: 4c9d565842bc733a279b6d5a7b74fafb5657e7d6
SHA256:589a232318995630133fdfa494e72caa96807bf8bb7b00af359fa26a667ef183
File Path: C:\Windows\System32\netlogon.dll
MD5: 6382a622ca72130734a15e269606aa17
SHA1: fa86e25c8f50d422af6990bd2f15e9ce184e0678
SHA256:3c42ac0aed98ed66a215049989b45ffba4b006439990bd6958ba1bb70bcc4161
File Path: C:\Windows\System32\netman.dll
MD5: 7c35f20263759a90d77a09045fb17b86
SHA1: 5e75dc1b1398b20b6a781f5e7a3a59ca864e9642
SHA256:77300bc6d9f7e256ed1521bccc2e946df9677c557c6eaab840b29b9eaac73f4f
File Path: C:\Windows\System32\netmsg.dll
MD5: 93b169703a87b7d3ec3d0901e5aac44e
SHA1: bb3058ed887e862cac90a71533a4db9c754d6aea
SHA256:d22fcecf0554a037c3c6683d3c863e3fad24a3012e68640fe7ffdf4fe4fa0348
File Path: C:\Windows\System32\wbem\netnccim.dll
MD5: 137284bc819adcb98d9a0ea0519f716f
SHA1: 11b4d69877b4a02029978829e5b2086bee94ca1f
SHA256:be903ef499a337aba36899e2a224c5356098d9f877f3a35fd5e2f74c4d61a564
File Path: C:\Windows\System32\netplwiz.dll
MD5: 0d8579beeaaeaaf700a83e6061e2ce5e
SHA1: 194743614d281a2ad93d880246661a8c5bc727c1
SHA256:4d6afcd62cfe52e0442252b0d7a4fccf2b17986696caace073089476f77f4f95
File Path: C:\Windows\System32\netprofm.dll
MD5: 1bab860f78d4a348458c4d4469bef90c
SHA1: b6443a29b71cf7277647ecae90f771e30710f188
SHA256:7f50cd891bff72e451e8ddaa87297ae21590d70c74b2d11a5dd7a644f9b743f8
File Path: C:\Windows\System32\netprofmsvc.dll
MD5: 94a36806313a9b6c9c9ce99114065463
SHA1: ec77752cee8bc4b72dc428619e29cefebc1ddaeb
SHA256:75e434e76d7e27edf42ef617139054da8af5efba3d59a2637d6186e2d9fb46e5
File Path: C:\Windows\System32\netprovfw.dll
MD5: a27db2aadb130e9f49a1870fd8721386
SHA1: 4d0460805773d4d6f66d6e003e09c347f3425d7e
SHA256:65580b6ec66f5a29ee328d87036b4c64cb514ca69025d6b65802810ac3d39adb
File Path: C:\Windows\System32\netprovisionsp.dll
MD5: 8b89a1eca25fe6d6c5f060e45c68e45e
SHA1: 5f6671275ea8a94a16cdaf2f81559e865be9a947
SHA256:379785646810322cd22ec51110954dc5f85f87b582934348c6e30b20d92a6119
File Path: C:\Windows\System32\netsh.exe
MD5: 6f1e6dd688818bc3d1391d0cc7d597eb
SHA1: 9184e64c36629a1dcef084e19cc3e3bef78f2d7b
SHA256:6b691b06fa865f52c9484ef4f10e2e02ed6d7c3a3f474b8b138a33af7258b2a9
File Path: C:\Windows\System32\netshell.dll
MD5: 2089b991a47c0ca661468e7aeb6b02cd
SHA1: c5f10c7b3a32e0ff499f3b42ffdb9c1f55eb348b
SHA256:693f2c9eca3e80446ac87c95f361b099d651574cc49b308452abab49c51f5060
File Path: C:\Windows\System32\wbem\netswitchteamcim.dll
MD5: a5108c7a50aa61393f6ee616966801c9
SHA1: 4f72be1840034983bee1801ec5f3cf456ba1a451
SHA256:0c80583d99524b7c4ce086c3b95d5717cecd3f43846802f2e1a27f456c8d6b9a
File Path: C:\Windows\System32\nettrace.dll
MD5: 7b51d528b8b5ef39ee49d0341a02c739
SHA1: 34a825499e55692a9a3252780ca1ef41d49dc451
SHA256:e9246f726eef2f40841a6d35723e8b5da0518c023fc06b3510da44eb2dd197e2
File Path: C:\Windows\System32\nettraceex.dll
MD5: 9570281ddf7e78506f78978b0c7e5a23
SHA1: d58f9d55aa670baf456f4c7ab6fd7fdc82ed8edb
SHA256:0f29e51333bf28ff523e4d69697f263e742b4565a433432f50e130e790a10005
File Path: C:\Windows\System32\wbem\netttcim.dll
MD5: 54f35ffe6dd6b725c724635a8ae09303
SHA1: d876d817ac8036aa97d1865568998de728a3a8fb
SHA256:7bc03583fca30a2ec600dd074de4d83d7bcc63759095add6150f6f6c6382e3a2
File Path: C:\Windows\System32\netutils.dll
MD5: e3c28aacec0e62cdb7a403af97e9f652
SHA1: df513c6007e7fd20b2259a2d73f3d96d1603168e
SHA256:a4d14e1089578ecea3942553376af0e48009bd8a57644722432425808dc9ec71
File Path: C:\Windows\System32\networkexplorer.dll
MD5: e88268861cff0a1f0405f1a20da95c1f
SHA1: ba7295cb5a7d5711b6ada6e3cd3644900d1b47cc
SHA256:0de8fb66516a0100dc6bcff415208802f7a754645a9f2f054c20c0c59e5081d1
File Path: C:\Windows\System32\networkhelper.dll
MD5: 19ed0120230456198aeccb20e6d6dbae
SHA1: a723115a1f7d797757cde7573949e4dfe99b98d4
SHA256:29918ab5b527860fa7062aa8cc30df209c60fb74034f82fc9cbb0f06a2779c05
File Path: C:\Windows\System32\networkitemfactory.dll
MD5: 37a586420a6aa0d2faf0837a42131c97
SHA1: 8a4385694649a0673f8a56c5afb0055d12afb5cd
SHA256:e64bdc17b712c8073b5c93e94b5993136d4c0e4c80de2fab212222aa9b317bcb
File Path: C:\Windows\System32\newdev.dll
MD5: 83375ebc239876f48b5d9fc1e2413b91
SHA1: 8cd8faa76fdd1e4184d6383606f0752a6bef29a4
SHA256:7120cebf591de8a5a5064ae3f84658a1fc5b23b0bb20e9948aefed47ba9b0630
File Path: C:\Windows\System32\newdev.exe
MD5: f1a665d511c08a772325a7cdc63bfcb5
SHA1: 71a6b29bc9ef86e71c715484f5c3c8fbf0085f6c
SHA256:4cb5284a4b0f06e6ea81bd5b31998709d1e945014fc434665e847edc672c52ab
File Path: C:\Windows\System32\ngccredprov.dll
MD5: d50b6028b2072b0e2ea610c7e4abcac9
SHA1: 9f1833f12d1351597a19886a0f4bd357b48bde68
SHA256:9fd79f0f8377b990e6e9dd8b3964ab03723fb9b533c4e2423b64c334cdd698bd
File Path: C:\Windows\System32\ngckeyenum.dll
MD5: ca998219fd6aa212d7535ad588361f52
SHA1: 726aea2f97302c6950906006771f3236eec5ccb0
SHA256:0a3b2538a50c9fda78a78002928fc8fae99b2b3db2bd0aef0b71ae6a025a1658
File Path: C:\Windows\System32\ngcksp.dll
MD5: 38e176e4c62044c7633b6432bb66ad74
SHA1: accc955fa3ba72a23997b46a530c92e60f50d073
SHA256:3b0e91c61953a27d938f872c27e3de352462404710013083f4fc410c2a02b5e5
File Path: C:\Windows\System32\ngclocal.dll
MD5: 425ef1a64bea29665dda5baeb6c5f3a7
SHA1: d5f3bb7bcefce4efd47861a19d32044464188053
SHA256:3ba0a2d3f5ea5b5f3050958da4592c97936cc7b4e683c13ab917ffa016e95138
File Path: C:\Windows\System32\ngcpopkeysrv.dll
MD5: 4cb75c31f06dbba5715bae9bcc8ece15
SHA1: 46ec371a824173d62b0c3db04915b5527a651401
SHA256:2cf8924e66d6a3dc3a6f7c77cdca2ac1e6f8c3b8b72310510b82dbbe6c81fb23
File Path: C:\Windows\System32\ngcrecovery.dll
MD5: 867afcc077a98eb4202aac88639dba84
SHA1: 24a5b63f9bff8d941852261b0b85de2897e682d5
SHA256:d8e32dc08cd61b849b29f680faec334cab9f8f8585e297735ecc3f9597316c9d
File Path: C:\Windows\System32\ngcsvc.dll
MD5: 7507e919bc6cc246086fc6c9551458b9
SHA1: 5e9d3ac75f5458ceb014066e217948386819737d
SHA256:e5e1a2bacc80e124d157f7e98c51a0d49f10ac3947ae73b76b45d9250cf5a313
File Path: C:\Windows\System32\ngctasks.dll
MD5: fa46988be44cf71961cb3d8fa14772a8
SHA1: afaba31d2fad3ef7eec22bd80568d3b09ad135ec
SHA256:0c6e064b95dc21a526d577b51dcd8bb9f53fb2c0dd6e6018a682219054978ae6
File Path: C:\Windows\System32\ninput.dll
MD5: 6377f7ae97cf7e1011a0fc82570047a2
SHA1: f906e90728fbf1102f65629fa05e4251eb2e1c1b
SHA256:807664fb87b148e431a41f7cc385be47ab96f0c4b24c4e43952b49c38cd598cb
File Path: C:\Windows\System32\nlaapi.dll
MD5: 2d980853426cb4585bcd8a72c218fa66
SHA1: a74d7571713528652913552e8d65e9b51f7be94f
SHA256:9336a4fa27bed0bbd9dccb8e4c1292c5c4cae302c4b90bd31ea466bfa5833259
File Path: C:\Windows\System32\nlahc.dll
MD5: 232030613e75729314f0b0f923224434
SHA1: 7c94d621579b3568c306c5e72f8befa770c503c5
SHA256:51502f1c0d3c2a628399abf6740bece72c94092af91672d4e1c58d732c73db1f
File Path: C:\Windows\System32\nlasvc.dll
MD5: 9252ea8a31ed8abedd22dba88d852a0a
SHA1: 6b5a0b6041c80672acecfb484c3b00bc65226984
SHA256:96a22ff7184da82e268759ace032fd35e5d04285cd2c7496b2c04eeb5dd8542f
File Path: C:\Windows\System32\nlhtml.dll
MD5: 3560b6e442965d836e0ef423c181b1b2
SHA1: 502d1d051fddbb4285f47a91588b30b0e6914800
SHA256:73523ba4a4b1661b0e8225c51f3c3c62a0278e83792e902f2aa889c6a624d81c
File Path: C:\Windows\System32\wbem\nlmcim.dll
MD5: 91a8df9de89b637cb71109a964f3b053
SHA1: d39b1946a0a9c20f3a4c9aea2021b6226801d277
SHA256:9215eb3db5068efdbe3406c154db6d7f596491b6a1212c8fac54455747c86b05
File Path: C:\Windows\System32\nlmgp.dll
MD5: 424c98ecd94d55b99d892b0fc55ac507
SHA1: 4d89efbae9afa22fed4c02a9e642124a66e62bf8
SHA256:05b8a3de752742f49032ddb0660eb79991f841ed6762ee543317d5b6d91db177
File Path: C:\Windows\System32\nlmproxy.dll
MD5: 2ed43fdbb774aeab2567b93eef6f743e
SHA1: 51e2e70eff1bc9588c1702b6ff76716828851f84
SHA256:6d2d115876b7518213420bff587bba59fe5e429603e934c51aaa18c88764f441
File Path: C:\Windows\System32\nlmsprep.dll
MD5: bb0763ee60773b96470a8193e930d783
SHA1: e3f0669491ac505eba9f6f92b914c94f29f11821
SHA256:df659f533521f1a4f8382856f7a7f32574d47261503f4d583d196a042bf8f73c
File Path: C:\Windows\System32\nlsbres.dll
MD5: 6c3d6f7e70af3de16830356c7431e4fa
SHA1: ee59ee6428b9d08b41c0b9870f6cc7bbd8977983
SHA256:cfed0f7f184a7761a7ff96044b8c3c6b68054df2c5c3b434140a147334576194
File Path: C:\Windows\System32\nltest.exe
MD5: c3f111e245ebb5cb9d102c024d080de9
SHA1: ffc57e7c2559541886e6a6aa22e44fa6fb74e566
SHA256:f8d8869f640af7156984e2d917c0bc101ae0c0823b270d268f074ca8307046bc
File Path: C:\Windows\System32\nmbind.exe
MD5: bc2459c4009e28a7e1d2db97ecec6ebe
SHA1: bf100f979a21713e78675f0e76a1f163acfad2b4
SHA256:9e9077de2e1b4b19d3f1f44a138620aa002ef1efbd8417e288f6dc14839e61ce
File Path: C:\Windows\System32\nmscrub.exe
MD5: 47733cbd1515fe8b68f6d21be38bbaa3
SHA1: c156f71b42420a0bfa6c28724115d8b19ece5e0c
SHA256:e896f074b077a79a973121d8c7fc91bf515a3feb38bcb0fed16b004a9bd09ae6
File Path: C:\Windows\System32\normaliz.dll
MD5: ead79299a6d80ca0f91bf425017fd324
SHA1: b8716f0037a56c20d03fd796f9b1ac2be96d3f51
SHA256:82c08fdb7ad1b9135956d766c4303c90e2b32656a99cd453e24fb7da2e93da9c
File Path: C:\Windows\System32\notepad.exe
MD5: bd33aa772f4751c5a79f94636088774e
SHA1: bd6b9b8bf4b0911846a089c620ce3b4a43ee9674
SHA256:c286747d319818c1205fd487040840353c5f4542faffdabae9131481bdfeb92a
File Path: C:\Windows\System32\notificationplatformcomponent.dll
MD5: 363be1ce85f3465e68455271fea60c38
SHA1: 49c60ea2edf6d753693cbd70a80f2fef9a625e27
SHA256:1f621f83ff5d834a083d4ca7c471649b08cd00d6f54dbcbf61327ad5bc52c22b
File Path: C:\Windows\System32\npmproxy.dll
MD5: 91eac2113e57db4ea5d4dec7cf3f5d85
SHA1: 7d2a2d65bd58ac072c4566ae7ea463318800cf37
SHA256:5197ae6ccb549d5c8d710c9ebab8e7c92dbe055b96384920d4b768522c670617
File Path: C:\Windows\System32\nrpsrv.dll
MD5: 8ed2a54836c0a6f721b00efd30ff38c7
SHA1: 10466d401f7ec85bd184b7f6355aff4733d68d4c
SHA256:271c96f154fdb8667df2231988c9e66b8e7d5a04dc3b3acab1af48c54631b010
File Path: C:\Windows\System32\nshhttp.dll
MD5: bb5ad001cb757b898f6770b270141d01
SHA1: cac56b0ac2e88afd9c799c70a8020afe0329816e
SHA256:0c2ac52c76ee842b51a777a7fee1d2fa0d8f859a8714c3bd64e424902d8e7b64
File Path: C:\Windows\System32\nshipsec.dll
MD5: 47f49d0b8c9148cf20734086a664180d
SHA1: 25a1e1af36bf57d9298ab41638e738e02d5edcd5
SHA256:c76107ff07f1969aee611d8c2e59bdeb82a110fd7e5b5e49ef16fac37bfdb5e8
File Path: C:\Windows\System32\nshwfp.dll
MD5: 36da4b196a3624a4b3f8d524bacb945e
SHA1: 71d7ddb32ef4b87378655a48a9bf073f021c1f95
SHA256:c1838ccd875bec9f5eb7f585e7262f9e3a38179b9d8f0db91ef1f7aef37470cf
File Path: C:\Windows\System32\nsi.dll
MD5: 69bc72f7604c6434a15ffa5ae72ed349
SHA1: 75702ac7b355a0b4ffe29aa6aeec5bb63acbdda4
SHA256:d3bc64c8fdaa24d66e05bc1eef91fa427e3a6d23ed74f9390fc8bfc3bf49ffea
File Path: C:\Windows\System32\nsisvc.dll
MD5: f9ccd2c8628b3e3c62c9b7aca63de43f
SHA1: 7b2ed71716dd4ca90326e9acd2860c3f2cce303c
SHA256:c5a3e4ca8304164d93852440b9b98764e0ff5470a7191dfac926283b134099f4
File Path: C:\Windows\System32\nslookup.exe
MD5: f2e3950c1023acf80765c918791999c0
SHA1: 953726ecd156848921609201c97c51a50c0cf36c
SHA256:55ab032d256adbe3fde40cf90fe83ba5eab591e04ad720161ed8e6ef059ca747
File Path: C:\Windows\System32\ntasn1.dll
MD5: 2367076911ffe70e7d1f0c9829e9b2c8
SHA1: 252c703bd86ad35fc260ac450bfa049a105f14eb
SHA256:832bd371fd24ed57029f9e21be5a42d063f357ca96f5fbd841552b134ce4aec1
File Path: C:\Windows\System32\ntdll.dll
MD5: d393bcdc6c83b15339bb018cd8b3bc57
SHA1: d064dbc3be4281512293a85425578af2d1052afa
SHA256:3b2363e47b5143d5d2f927a5b84cabd62d1f08214030f5db1120214631bf6033
File Path: C:\Windows\System32\ntdsapi.dll
MD5: e58b85cf5904d74048c0ee5507dc24ec
SHA1: 5d668ea73ed734e2d5a061b2c011d6963e04a53f
SHA256:46e05d42cac9128752865b0d417ae736423a3be6ce744afaee4ee6a5d9fca1a0
File Path: C:\Windows\System32\wbem\ntevt.dll
MD5: 5b0dc138f8dfdd5465f646837c49cc9f
SHA1: c3a1425d636f13aff00295bf8d8bb150bbc9a8ca
SHA256:b57e23dca550a10fbddb158c74c77b46951daa28a64f85df7e3cdd99038958fa
File Path: C:\Windows\System32\ntlanman.dll
MD5: 7cea9080aad23060e1b5cc1a90ce699d
SHA1: f1d2278a560aded5aa25ce132fe5b6699c08f8c5
SHA256:d04ec3e8e6c2151f7c8115a1186bb6bc7ccc72cd8e1c237f4873da1350ffc20e
File Path: C:\Windows\System32\ntlanui2.dll
MD5: 7c498e81f8062382767800d202c13385
SHA1: 2fdc8885128f304c44a96d6b8d1f3ce8f1b66067
SHA256:ab891f21beb23602f378dd861a4afc9205a483eaf3a64b48b650bb96d19b091f
File Path: C:\Windows\System32\ntmarta.dll
MD5: 1a2ce30601518c0da155c6a87d7b3104
SHA1: feec2f7aafd57e3939ecb218aa5cd7733ca987e7
SHA256:252d198d0660d7d021209c25ed91333a63ccb00e47b00521af9cb562ca1d7e3a
File Path: C:\Windows\System32\ntoskrnl.exe
MD5: 94a3db0b8c4b3dc35f4121759eb7340b
SHA1: 4374350d2f7b3a96b450b2b70109ee5ca4aafa57
SHA256:f729521924dc164f7855ee16b218e86cbc767057c7bcb512e1137673c8021353
File Path: C:\Windows\System32\ntprint.dll
MD5: 9f631e4243c499135fac1ecd72cbfff8
SHA1: f38911427bbdc48e5d48b10086610f0cab4f1cbf
SHA256:96e247c4fa71355f2df3a910eccc8b6701517daadc18783607d736aac8eda925
File Path: C:\Windows\System32\ntprint.exe
MD5: 2767d381a13af58180402ddeef6d4642
SHA1: 817872c9622ff0402b1e76a5f1e9edc3bf7ee091
SHA256:b013c5cc135fd449c2f99b01c48019b0f8f92cb29c5ab623a773c26a7bdc4b96
File Path: C:\Windows\System32\ntshrui.dll
MD5: bbbf2f2355041b6ab54296e51130421e
SHA1: d276b903125f0fae79a188b1b7217e0ee7fa2d91
SHA256:fdfa94bccf080d91cffafcf80bb1aed316e7b915a08f427a984ac3fe7cc3fc39
File Path: C:\Windows\System32\ntvdm64.dll
MD5: 2a4e3f5676a13d5e57c20bdf43dd1269
SHA1: 553b5a52b96cba3d9813fa8c4c705bf4dc1e10f3
SHA256:884a9c982b04eb96bc84c2bd3356b473e982b61b48aeba87d17a8e559acb80bc
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nv3dappshext.dll
MD5: de97ad8dc9567abcb2e8cfc037cfe39f
SHA1: f1662a8626ece59b626b7d6a66189d1c7c8fb796
SHA256:d1dcd05f95e113c744eacdbf154983a1f65ce69548917664e04885c8bcfc1c67
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nv3dappshextr.dll
MD5: 936aca867954071268f2cdbdbda84025
SHA1: 8cb385d46d58766fe561c638c75d070e3ccb4113
SHA256:9f7080bb488f995f871fa57381b80281ff3040ca54bc882ba2c57bd4629940c9
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvDecMFTMjpeg.dll
MD5: d62d80d136fd4ea010c56e2783d58cd8
SHA1: 2971c1401438322c5a17f2c48fc69b5d134ea512
SHA256:749796302368935af9ac67f856f02162ae43b8546a9d22591dda013d981755ba
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvDecMFTMjpegx.dll
MD5: 6ac4d32a109707ae4ee9fbb5d3d373e2
SHA1: 9d54fa11c5ba459b2c96287e84392a293695ff19
SHA256:46b32d255a506ecc3b244702aa2213fd5fadf826a3d389867f1a5ccf3bc6d5f6
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvEncMFTH264.dll
MD5: e3cc17e6196965a0e905b628a92d858d
SHA1: ad09815b320069ce50ee4d67a5e61ad7e0d0308f
SHA256:2ab74ed946bd09eee22a0d187c7b6332d377a9c65b9a04aea76f9a9a95f2c544
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvEncMFTH264x.dll
MD5: fc1d1a839ec48949b9a918e0eb18095c
SHA1: 0da4fde0da31fe38e87a68ecf1b8acaf85a4b92d
SHA256:3570d51bfdbd5ebc92f3badd5df8b172ea0c3f4f95d458ce3e6f0a07e3470202
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvEncMFThevc.dll
MD5: d5bae6f01f863b869a02bdea95fe2ff9
SHA1: b3c3200194402aacc63ad48a42c4ec229e499444
SHA256:532db5364890d8751375ad40e32813bc7d5481fd70888b44787036b318e6260e
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvEncMFThevcx.dll
MD5: 53ece55711b089bbdfbad2cef57ef12c
SHA1: 25fe75480964be397fd7ae8c995aa896976694f8
SHA256:49483dd4ab64496d11b8125858da6c6f7cc1dd41b29e9c3f9a876d1a28f75c67
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvEncodeAPI.dll
MD5: 7d703eb7c771c2987289fe374c4a46db
SHA1: 73a5808e4bdfa1c00340f0a148e392901bdb12d1
SHA256:bfa714919e83a3943d75434cd72b0e8a61ed61407caa5f6c81298b0d7237b02d
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvEncodeAPI64.dll
MD5: c9d75db2967abdf68bc8e6ceaf9251e7
SHA1: a1ea51f6bb55f710a3c7cb566588d54a57c5b232
SHA256:9b326722f31162da109d47cfccc93443e03c6a3cb1720f8034e739fbbdf32abc
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\NVWMI\nvWmi64.exe
MD5: ef84de9d8ae9793df5739f93035c0fd6
SHA1: 39dc6f671b130709afd759d95e0249752c5f1f37
SHA256:d9a582f190f35cc085bd79aaa8c80188b8f188ed56d126bab102a3176c168ab6
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvapi.dll
MD5: 2c7dcaa95364ad3c8b8f35c743475c89
SHA1: 687f14a79b01fdb303ce1a7bbb924dce24e5c348
SHA256:6bfb7ccebdd3d515e6b816014653cad2810339d1a8176cf5a5139807ed270694
File Path: C:\Windows\System32\nvapi64.dll
MD5: 2471090bd59f7d9f93894903fa95d1f1
SHA1: 74ae12e78ef42ca7155b3d92cfb6fb2025a09e35
SHA256:b5b8f0bad2b9b22e2c86b8fdf44f09e9d748eed7c0e10bf45f205bc674a00763
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvcbl64.dll
MD5: 3da4694030f6621039a85e712290c986
SHA1: 372a62c4ab58ab8c73e9ac331aee065bd33651d2
SHA256:c9d5f5e97e2ef76e66f4a58e4703fa93bef7a0490ab14c31fcb80068d507a88f
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvcompiler32.dll
MD5: 59002ffd77c860bdbf65cad32997f59e
SHA1: 728246516f2764acf025efbfde6b3e1a9c1bddde
SHA256:f558c16624c2a59fdd0c231345f69b1d979bd5d2689f60b95c279178f7e45fa5
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvcompiler64.dll
MD5: 33083fdd9ce9f12d660e7f29a8cc21e6
SHA1: ab9b6eeab7b2868902e4b65237e1a5aaaf9877d9
SHA256:9ff9acac31ee933ce4b445e1eeabd015676f2fec3d73686139524806e7bdfcd7
File Path: C:\Windows\System32\nvcpl.dll
MD5: 16257b65eb57b160b14ad7422c05c9a3
SHA1: bcc79593d2848067e0543c24317ec57421825727
SHA256:959816000dfdff5b3c5373df4f39c19bb61f78c339240378916d5f2bbea9e5d7
File Path: C:\Windows\System32\nvcuda.dll
MD5: d03928cd9baeb389872b36660dd303bf
SHA1: 65adbcdb543d86477239e311312026d47cb62d01
SHA256:3fe207f1b89c3548e0a8ca9c26ac887478613afa201c3536119d15c8c94d73ff
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvcuda32.dll
MD5: 874cf9cb34af41280d7a33a9603420a5
SHA1: 834273d8c62ee6300089842e6483035b519ab8a0
SHA256:6e2ac4306c0dca8edc8ea7494cef047c33e5fb61aa47f90057dfed9eeec91172
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvcuda64.dll
MD5: 554586fa1c87c3ba4a58747b2eea5dac
SHA1: 99f2b90713daa8f3bbeb55375eb7536c520ddeea
SHA256:6cc8258564da42acb462a23df7338b1cf47d24083e20a92c09f4736e5bca0e3a
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvcuda_loader32.dll
MD5: 38e526e78bd586fae17693bb38caca55
SHA1: cdc9db92733a5fc73272e9a11131946fd12c5c97
SHA256:7a3a2641bddfcb7baed46002808c9c23e4868779e070d606386d5cd5f161d9d2
File Path: C:\Windows\System32\nvcuvid.dll
MD5: 7bc4f1894489eeceb481951caf8e607e
SHA1: ac339e614934dc96945b75256e98375c589dd9e3
SHA256:808a7962bc97dc86751da0bc18a8acb5bf3d3f2dab53b9e49fded66852b9d107
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvcuvid32.dll
MD5: 8be3c20963725a94f6e86739c259fc1a
SHA1: 29f22974ea53c5f7bac0d4fb6ae92daebc1a65c4
SHA256:af0e150f1b7dd253e0c4b88ba2e3a2275dadf95b685821ac8286fe20b3ed7012
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvd3dum.dll
MD5: 75a5e2202f9807d2b1b8b28f16d5246d
SHA1: 5d8a94b16b1632c278ce8da998a644de39c90196
SHA256:bfe4182781b44c426445a86d1273450bfbaa77eb6283428042b10cbd8b58bca6
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvd3dum_cfg.dll
MD5: 474d4521bc7d3b33d69f0a00549f987b
SHA1: 10c871c9bfa3eabb24946586a0f2a1f04d5156bc
SHA256:79886758eae63cf0e35bbd7895a16b6c1cc642ee8c66e16455fbc3fbf41e9ef6
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvd3dumx.dll
MD5: 40b8ea85ee4314595ded4180c4645126
SHA1: 2cc5a5f9307eba361552caae56eb81bf6b209449
SHA256:4406c55ecd8d9aea0ebfe4fb459c91ce761fcc3b42b9e450e3c465fa36debd10
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvd3dumx_cfg.dll
MD5: 9c840ad0d598bbda16e9c7fed537b525
SHA1: 4171d78d0361d6d4d84be2bea464d71ba1d658b4
SHA256:09268f30cc2ab4ebb3981f2c3dee3289cc816ad758590d03d1fa1e35d1cca5eb
File Path: C:\Windows\System32\nvdebugdump.exe
MD5: a430162f029c99a5702e73312e425a39
SHA1: ff281e63d565422524fde65e410ba10027d75d19
SHA256:9c7b125e8be8da7c9dd3574b8b571f59618830aa64a6ab0a4f78ab94919d9761
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvdevtools.dll
MD5: 40e5e60b4879168022927058942ef8a7
SHA1: 7f87a5fb77f0f2a0fbffdd48c227c48070286275
SHA256:48e5fc18031f5492afe4ef2da6707b4477ec085d91bb7a4c166b80474ea06e8b
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvdevtoolsr.dll
MD5: 4e84aef3ee809b6fb8d125ce963b336c
SHA1: 5358b6141359c85694228e7ca1d395ccfb8ed2e5
SHA256:e5ee5b069232c3da522632e72bea931e83cecb4fb9c91e884267953359c78a08
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvdispco64.exe
MD5: e6e0d32396094f5250d8ef7a5b6a21a8
SHA1: a1cf40081aa6769387c95265979f784c5c4a4777
SHA256:d7fd37c22349df273de3428067aa06ec8234b0a725c4afb463d9e28e8042ec51
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvdisps.dll
MD5: 51717e018ba9b0bb2029b9931eb71459
SHA1: 16316483a6957ab2d508cb4db90ddec94e9759c2
SHA256:b3a06abd99dadc9408fe98ccbe524ef61605621572fe8c4b1ed08689d4fb68a9
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvdispsr.dll
MD5: e2b81c9c79aaf43450e6298d7a864334
SHA1: e320275d691b3916a43501aae502481be1a07bde
SHA256:93433fcfd33be0729a623178f16d255bc64531a9740ffd1b6302d1f0f39874bc
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvdlist.dll
MD5: c11fb8103926966279da06bf27402801
SHA1: b031726e91e80dc27ab4f602145a10ce3ebd90cd
SHA256:75cddce8ff0e08f119aa0973e9a9f58450fee656f2f9d2f8f3c330cc7f07835b
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvdlistx.dll
MD5: d03b5392e60cb76652a02c196d0e268f
SHA1: fd384a2e00e4ab856859beebaf6a577c31f7b3ab
SHA256:add6bb6304a145530e7cb45b6524d2033321533032d946152e64c1bdffc2d345
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvgames.dll
MD5: 8bb1f56e2858156711c3b4a10ec88674
SHA1: 4956a59674cef20da12170530b9fbc4506c21536
SHA256:b7942e48fbba43ee215ac896ee1a549924885d2a6d34ee2723a738b6ad38e163
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvgamesr.dll
MD5: e4230ca0c76df27b1df9ddf6682266cd
SHA1: 2fe2308b29233a1abdf95cacabd9e7ff706cee19
SHA256:a716ae3f7975503f27db4381bd5c885200d965bd9084bb73254b900939d0a8df
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\Display.NvContainer\nvgwls.exe
MD5: e04948b01c6dada8f524c64c166a0941
SHA1: 6ed81dd882894b88893bf3534a545957355893a4
SHA256:be728d2ddc201a7a3b5877a805a00af786672b49598b6d8656cb149f546cf5ed
File Path: C:\Windows\System32\DriverStore\FileRepository\nvhda.inf_amd64_9d5f6e74c4b6f9fd\nvhdap64.dll
MD5: b462e00b0b87081478cf03bf240a6f55
SHA1: 1ff170d8cc15d78102bb16a8671a6b274e4b60d8
SHA256:c3210791965c00afd75173f7ff0ba17aa11eee03e3605f2a07f986aedf08e6ae
File Path: C:\Windows\System32\nvidia-smi.exe
MD5: 7a80047fa51bbedf26a4d9c9241911d3
SHA1: d3e2152faf31221b6e9bb494f467b746cca288d0
SHA256:afe128e788f80d1fac378a9347be05bba68229cfd7d08235630f31539e41b773
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvldumd.dll
MD5: abc418b052a389b26468e79163310498
SHA1: b6a2a1000c4dd4db716baddea04a54dd33fbffa6
SHA256:7b0484951cca3cb4c6b3cb1a0fdec0efdbc8a8e6c7c1de1ccefb02092c775d96
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvldumdx.dll
MD5: a81bc2dcbd8d98815090e3e925bba04b
SHA1: 6611c8766ded6c9942bda7884aae95d064f54349
SHA256:ddf237c6af0810d3f361d170c00200e3a94ef75f3b6c3d05bfbe4fee5217a7c4
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvlicensings.dll
MD5: ec57cd1aa5663152442b8435799f0472
SHA1: f0df338a31a7272dff619bf3646098afbca2be4f
SHA256:19ec645033842925463ce47236ebe7699db0453644935b7a66bbcf40311b50b5
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvlicensingsr.dll
MD5: 95891daacf57fbff64267f74d643cc56
SHA1: 65977fbffc3e09c989a82d0d7b55ecfec7c9b9e2
SHA256:fa55495048318130a20d4acaa0a616202ae0a1c9def8c91b19281ca2eb7d1534
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvml.dll
MD5: 0d3e3c9211d4977ab52245b5d455f2f0
SHA1: ee9bf5609a0ddc129cc5ec065d63f4b1b89ed518
SHA256:359226ac4c01f652d379b64fdf5c4bfcfef9469f8331222dfd89f3b3bb2c3104
File Path: C:\Windows\System32\nvml.dll
MD5: e95576efd72cead09229008e918da06f
SHA1: 17097f1bf83481e2bd6ee8d1a398cdc5eac7232c
SHA256:6d98988de960dff3a9e459db14f1dd9b44a6474c5c28002655841d65d1f89ccd
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvngx.dll
MD5: f4efbe54d5050869e5695b2da7daaa0f
SHA1: 773f5be9f4577a3f3d72b8baf2dcceb8dc77b72d
SHA256:cc74c02cb62ed1775e8cf930afa17dcdd9364a3c7be242b931083eb1c73aff02
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvngx_update.exe
MD5: f184b1ee1b97f242339bd14904069d60
SHA1: 54f91915181fa514a823dcc4ae7057fa8fd8a5b3
SHA256:fa70dcc61e39ae229f16e3dc476104ebbda1c2b41d82dbe4ee0736528c029285
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvngxdlss.dll
MD5: 851b437fe884e7262eb5e49fccefd98e
SHA1: b015e6da971aad6d68aa2b3f18c09b02d50d760e
SHA256:93db7d0fc5f8bdef032fe754438d6403d00ff940683fb6a78787f90a2dc2b7b8
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvofapi.dll
MD5: 45220ff3c54e41080723c6f66e50c869
SHA1: d08cddd62e3928d586ef588b403f5e103c61cace
SHA256:cabc5f59e74af9a033f4bdabd3369d9d6a89b25403e5d5872807644b4ab6cf37
File Path: C:\Windows\System32\nvofapi64.dll
MD5: c551d382f16b6fb5c0681fb8bb0d96b8
SHA1: 927dd23646af1f471f25149988f5cf67c1e9b896
SHA256:bba2e0bef18d0cc06b59ea0f064f6eb472aee6016e3a03d01165655c199784ee
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvoglv32.dll
MD5: d885b888592efd9f97c639657f3e26da
SHA1: 44232cb7f8da560ed0c09e22e195613e8eea053a
SHA256:9254b94bdd26de10a337edf432e94955137000cbff2eb9d4fc4daae0613b3b9c
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvoglv64.dll
MD5: 18d2e2495d25fb77bdd44fcd1a577590
SHA1: ea5dccc53e6ace41d3beb3c10df51fb7ca8ad126
SHA256:7e738d9b9d88caea53cc34550a6b567020184582f32a9ff13f9a68f6f89bccee
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvopencl32.dll
MD5: 8827afc479889082a1444b5eebe44532
SHA1: 78d580124b1933102c0aa6188c0603efb20640c4
SHA256:ff219efb042eb9f02f46fc9aba318ba6878e86265819c042ce83b79a4c720c5b
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvopencl64.dll
MD5: 59cebfeec81ba874547a54c2aefa7d15
SHA1: 4cbb495355f22fd87ae7b3ae8cd678d3c693de16
SHA256:0ecc69ba23aec819726572212be1e1fde61742c484c547a6db5683cd6bbd52ce
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvoptix.dll
MD5: 2f8714a5ace0809e253a1076d142cd98
SHA1: c4661e216752edbaa530ec3baab395c19f3c96c6
SHA256:2660cc443f39951ef5829a22bd115ca369a39cdf30a34f6951143287754b868e
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\Display.NvContainer\plugins\Session\nvprofileupdaterplugin.dll
MD5: b21cbc128f036251e1e33a055df124fe
SHA1: 1f18a8a83eec55ffc086745b93aa9745b8d1320a
SHA256:74533f7d5f053cd779b7405dd0b6fe7b0773263d00be0af38a8fa235e2a0deaf
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvptxJitCompiler32.dll
MD5: 41a4d8c07f4ca92af37b24519ddd8ef5
SHA1: 6c659e50f6ebb7cb260f45d33d9db0a179535d57
SHA256:17b413f959022b121f2b24163e1b8d3ceb0a331791af90a654e39ca3ef578869
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvptxJitCompiler64.dll
MD5: 563463ce94b487030d85d8a2beb94843
SHA1: df7303f7c34894caaa16724dab4384544e14aa75
SHA256:12ba4cba1c969688695400d246474c00e713180712a540f687a1bc28b61fcade
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvrtum64.dll
MD5: 9a9f31d5e10439769590462294fe1b50
SHA1: 61ec76cdccdf422601f8ecda28dee0a8c1d17105
SHA256:770ea3f224fa86f6bb5c7501700be278b2134c47d4470b6e471e5e974406da05
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvsetup.exe
MD5: 7c37c7778c9ce1ebc17319b2de750384
SHA1: 568676a83e346c92d9e95d930b401593ef385ce8
SHA256:67060db1679b279c101384d7ef9828b7d5959ba92d6ecdcd498e66c1d7494f8e
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvshext.dll
MD5: 78f7540ee70c25c39a17c804cfeb1f82
SHA1: 63a3dfde88ee2374619ef53cdb7b6176f4c5cd46
SHA256:16d739d314349001278bbca57c323c7310407d11282c4e365dd119e59e1de49b
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvsmartmax.dll
MD5: e0aa04046a262cb70421b93fccbcab22
SHA1: e1965a4520d4c7598c0ac3665a9bf3902a2a14ab
SHA256:f3429f58058a867088547c5189dcbe9af515e07b32a464a60e932bf9258a2b27
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvsmartmax64.dll
MD5: 4d57e117e45a07c0ef9c6704a33ceaff
SHA1: 0e3dda1a728b90fbba2fd446788d99387e44d7b9
SHA256:95da1098fb41dd68ae34c95abc4f3129973a7830af46e01ea1173c00d6bb7534
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvsmartmaxapp.exe
MD5: cc3893bd4a4556e053390d209148d952
SHA1: c26706a0d4d1d47a7b21a0a91dff7ec3e6377ce9
SHA256:769ae6df9dfed7e2d3035c06c1b4c97ff2f9fe5dcae48e7c520f411dbf0efca2
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvsmartmaxapp64.exe
MD5: 4526ed46939fedb140a658b1f07cc6d6
SHA1: a8d5bd75dd62e2571ecde0d9caecc37ed5b65052
SHA256:30f2c71ff8423d1f0649df1559ef7e806df0fad5a70dfb7bd1fcb5797fefebf4
File Path: C:\Windows\System32\nvspinfo.exe
MD5: e03d24a1618f3e18ac67bb10898add0c
SHA1: 6a2e631b4cf7877b971f4d35c5e04a1d62064526
SHA256:ee8889fda49303cad2bab459bbaa215e105b41f28c69c68eb8f764124d47982c
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvsvc64.dll
MD5: 6d18770bed24a694baaf0f745a660bbd
SHA1: a50d466ea4c334fa603df9bd7137d6adb05fd2bf
SHA256:405127bd1013d8857bc6cdbe127e5b60046b4345bd52d70a7fe50d9ffe22acd8
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvsvcr.dll
MD5: d6e2854687733e5a961be5d680c8bde6
SHA1: defa64956f97b70a401557099e41ce00cc7abd44
SHA256:bcc9054581fb400e91806f7eede6ae681447b8c5ceb1dd08f6601cad661277ae
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvsvs.dll
MD5: 7e6b962a7a704c4cd3c1d88b11b8395d
SHA1: 143450a7111c41cc8ccd62a05c465c2775b1bbc8
SHA256:043018d9cb122b4ecff4d2cb815be09513ed337f86ff1bc09e17aefc1db8910f
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvsvsr.dll
MD5: e9712ef0b2dc087b720abccca2881325
SHA1: 93a5c0642d0933f99c2a35d09df05d1a3af5c0c6
SHA256:959e7819e57e318c976ff65a2b21ff9d3fae46bc0dbcb60c221fb93a22d0c3ae
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvui.dll
MD5: 7b92189311b58cc688524b04526b9851
SHA1: 679714aaf410e3a731a0d5ac86c7670b28a928d6
SHA256:a7334579ca53b6c67e5c119eb7afbc2e7b76cd3af3f097bb4ba67a0b644e736c
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvuir.dll
MD5: c8e1e0b59f5dac55e0983545696aaa02
SHA1: c5b32a6c3e2342a8f990af21545605065b7c61b4
SHA256:b9d0995303d9d90f5cecf1416fb41b9af1cfcba37698cb727ec30194042e9f94
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvvgpu64.dll
MD5: ee98ca702e01c4de579ecbaa19641668
SHA1: a363a9777f3ecd67162ea58cad74c33129f55ffb
SHA256:7580a86e3c6e237c804f10f061803a05e1d65316b2b63c9ba481621e14fce81a
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvvgpuconfig.dll
MD5: 2df2637c758519aaf49a16f3d9ab1f66
SHA1: 97103a088d0899389abc68188bb7d803c93375f4
SHA256:8d6897e9b5594c47538e3da5368bc5fa99b2133c4ebec0d891d69cec6713b6ab
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvvitvs.dll
MD5: fc4506e99ae1f8ccbc6ebd92f048b62b
SHA1: 6fd64a39127e06cc92f125e8a32289cb79179f2e
SHA256:191d34d776cc4e11e48d438622892b4fd85d55e45c321bfe85270552930032c2
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvvitvsr.dll
MD5: 5341f99c7af86e1e9661ed917facda81
SHA1: 719be60ee78663f0f05aae405f10efac18666b7e
SHA256:346a4f8a46b152d15b89dde48926c2c80bb471e0deb8fcf7e5287567c5678f96
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvvm64_40_0.dll
MD5: f2805a9e378e12a1ac73de1260377aa4
SHA1: 0937c1444dbb62c77b90c0074a1cdf897c85ba21
SHA256:3d28d29c421c38eb4c4eebfc955ea28f6d0749ea535f43c0b03ac9326dc4a380
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvwgf2um.dll
MD5: 594c0ddfa9b3501ca1a9ae9892027d08
SHA1: 4a73be53767e1efc5f2f403e9f6b1d5c4f27cbdd
SHA256:9f91b7ebc41cdd59946ea289f13da9ad7b766bc4c49f37dbe9c3ee27042bff06
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvwgf2um_cfg.dll
MD5: e5d4865db4f258c735475a7289871620
SHA1: 50fda3efe8bae070bcf4049989c9bc8145877851
SHA256:6c7c41739ebf86ec0191784a7a96c61fdbed9df8895021d9a40456af483c05e1
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvwgf2umx.dll
MD5: 0c4e98bc4b3e4ed80fc9bb5434d93dd4
SHA1: f0d4e59f3d2a43b1d42793217fd1f342bbe03034
SHA256:f817307747c22faeb1b137ce760eaea21331be29cbbdf366a70e4ddadc717687
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvwgf2umx_cfg.dll
MD5: 1f47a314d41326e998ff7c8e840fa18f
SHA1: 6f8df0005bdc9bf50d294fe98808c37ad84d4660
SHA256:2e2fb2e95c248f46bbd84e71c258d2a8d733665d0bcef1fa48b74f3555b95e55
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvwss.dll
MD5: 53bb51341977394aa2aa9099bdf8b802
SHA1: 2e1ccd084b6f5fc57002b0aedda18b3056d82f35
SHA256:f5e3594969ce3ee7ea27e9353ed67d33a1496ed73b473c364a00c1f362181ebb
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvwssr.dll
MD5: 5ee6e63ec9fd48817355caf636f9f661
SHA1: fb220d087ff1fbf0cad8fc6c28dc69577de6cab2
SHA256:ca8090ae6ec006bd5d7e397cbea433068258f986276f891a16513bac4ae62bc3
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvxdapix.dll
MD5: e53be4db8958117bfb8d11c8b5d3051f
SHA1: 97061f79c240b3660254a8ced6250a3bc1a0cae7
SHA256:716e09d75799f12b6a642d00929e0010d63d56e699225f4847560db7cc88543e
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvxdbat.dll
MD5: 6ee1daa1e1b69ad91dcc2859db97ae33
SHA1: 91c80ba7dcba859578aeb2a5eb592aa75c9ac89b
SHA256:6f8e2b7c5cb6eddfba531c7d24fd20e3fe02726039e46c63ddb6c738594f0798
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\nvxdplcy.dll
MD5: 8c1ab07152f2b095be6a68d1d46a8f0b
SHA1: 733385c095175c10afde9ec192e2141c82e872d9
SHA256:943fa1a678ce21f8868fec6bba6387bf0597dd64c9bd343c51b88165e8180cb2
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\Display.NvContainer\plugins\Session\nvxdsyncplugin.dll
MD5: fe4ffcb6388293495f42aa43af457390
SHA1: 7abf15521a1c0dd7ea05d12c3ee59d6b30cba313
SHA256:ac9203a4f4bb17ac19d34e9aebc7713b30605538f204ea9465c83236f57eff5e
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\oal.dll
MD5: a8f342d3578f29a5c62ec6301b24bf58
SHA1: 95d4016a464ff0a8525621f8b6e899662791229f
SHA256:0ac1c1ad2023557859a14baf39c5703c7d22dea6612b052b30179dbb41488549
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_d372a4ea3b959b1c\oal.dll
MD5: 5c3fa80fcef5ea464466c6bc7a7726cd
SHA1: 3586a21aee4361ccaf2966707a3383d6e5f70cf8
SHA256:f1da9114b19d2815827e748a1c0eecbbd10089feb79c04a2cd81a6e5f45aa087
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\oal.dll
MD5: 9e72967a7b805a6071e638307977eb3c
SHA1: 2e895182af5dd244262a17e88b607e004275aa03
SHA256:cdd34675e971f313b173e17e9dbcbb36c2e6a3be1482d8be4d4eabe9a68c6622
File Path: C:\Windows\System32\objsel.dll
MD5: 46b94e53e9f5df3db3e2b5c9715bf75b
SHA1: 327b26cac2f0260d0ee138bd6af34f75b2cfb70b
SHA256:bccb999cc44f428fc8092aad512d84dccd37d217f949e4edac0360f5a42d12d3
File Path: C:\Windows\System32\occache.dll
MD5: 45c4a5e952b97127265a785e82a296e9
SHA1: c5b0a4887698e4b15a653c4a93d9245adfbe379f
SHA256:a614aee3b36141940b86c07661fed7435da295f0f80151872aa751a7b65eda17
File Path: C:\Windows\System32\ocsetapi.dll
MD5: bd0a29aeaf70077c5155f2fb787fbbcb
SHA1: e7e0513ec5387c7a4316097be6b44f1274c46538
SHA256:c24d4249400769ff0bc155f6a88933c44768b7fb78cb44f30ad12aee6e6f367d
File Path: C:\Windows\System32\odbc32.dll
MD5: 3fc70df7f3b2dc81c7b5ecb0e7713852
SHA1: c9ec7e7c58f894e5e3d704931eafbd1dd7ccdfc2
SHA256:beb0126f037aa5a3d452063d7d102b8a9c7f52bb322b09c2fc7fc9bc5bee5e1a
File Path: C:\Windows\System32\odbcad32.exe
MD5: 5a39c66f76f4629666badc65370744fd
SHA1: 6045f8797503004294fce6e449c7d6fedc24f2b4
SHA256:a7de309d8a5a68fb4623d41914ab5f03d6ff7bb2e0b5927afb402da137be6ca9
File Path: C:\Windows\System32\odbcbcp.dll
MD5: 13b6aa6af706345f9e1f664fbbfa7412
SHA1: 04301aed183a293fe2eae14963d5155507cd4162
SHA256:97c46b51787a5244764f72739ada8b69ec6ce74a151304eb1356aa0d9b61a175
File Path: C:\Windows\System32\odbcconf.dll
MD5: fadd821fd57170ece5dd3d3247783e57
SHA1: fb4330332ee1164298d0919bfef4a4d1bec052d3
SHA256:559438aa9bdd5c280daefecfb6e7b655e293cd7a6c8a6f7dc5c129647a506013
File Path: C:\Windows\System32\odbcconf.exe
MD5: 7d7b705e462b7eae1c4728064e5eff1c
SHA1: 50d0abda40fc878682723bdaecc12d3974419429
SHA256:476346234300504cccf360ef8172b4e07cca59b43b7f09818b11b71210df3481
File Path: C:\Windows\System32\odbccp32.dll
MD5: d62436fe746d96b8364f22ccf311079c
SHA1: 827be80a684ccc9d52e8dbcb030e6cf6335d1d52
SHA256:2d83572199aea3396c23a4c5c3b0f9fa827c82f9ca0b58ba12c79ed418c9cc72
File Path: C:\Windows\System32\odbccr32.dll
MD5: f982ea009e4a8980297c83bd9b4db913
SHA1: 65e306b376e629c44c5571e5aab58a6c8cae2e1a
SHA256:1260e2ef398fd748f663ff832cac4bbcd83ba79db1c1399b6a00d1c0d3a08591
File Path: C:\Windows\System32\odbccu32.dll
MD5: ba72eac2248aa909dbb221313469f7ae
SHA1: eb76785df345cd88b0c2af2f12fe3e71d66a1cc9
SHA256:bacb2e4465db80722805f970e97331166dc0e263aac74ea77cb99b1e995fbdc7
File Path: C:\Windows\System32\odbcint.dll
MD5: e8a1c9272ddec13e0fa7ffc17ebb78f5
SHA1: 557888e01822d4125f34a891aafca12b2d1095fb
SHA256:e323889a8ddaea490ff19b9d9f8a1c0f9b2aa5ca2d732ce1dee561b03473b6ba
File Path: C:\Windows\System32\odbctrac.dll
MD5: 44a45bbc9100ef87cde53c3c8b459543
SHA1: 62cf56057417657a79f0c608cfd244cf6c09f29b
SHA256:da612cfd35fb93c94c08a13a60b69214c75b4b4e258397a5a400ab6a5350ac5e
File Path: C:\Windows\System32\oemlicense.dll
MD5: da74206c3ca39b93f072514f2e2c0306
SHA1: b4d462e49f541e0a8331b150e0e65f1347539894
SHA256:bd6b87de6400a69d9255fec9ed9f28885d635b91f0509aac37e0489d0434f815
File Path: C:\Windows\System32\ofdeploy.exe
MD5: e2163e4f585ef90c304eea2d7f6544b8
SHA1: 7f67a2c7a50819ae051c4f41c9e0d787de919e7e
SHA256:f141328557e0e920d5e4f12b222b0febde198e6368c23f71bee65bba05f18402
File Path: C:\Windows\System32\offfilt.dll
MD5: 4b77853032a5d72b4128215fcdbb5c64
SHA1: 4addecf93c56e3bcb6cca845ca0bdaeb6721eafa
SHA256:34f6902417d1a2b3b66f8f1f17de01b1cce953f06d2caad0f6dcc4af48bd9822
File Path: C:\Windows\System32\officecsp.dll
MD5: 808347a8c79e150520cdd6cd7892faf4
SHA1: b9ebd60ccd75c8be43e61436eb886d9fe2b208bb
SHA256:bb829f15c25ff82de982d4a58c67ac25f5fb9b9e4fb06ebc492de900b05391e9
File Path: C:\Windows\System32\offlinelsa.dll
MD5: 1115382ec6b620ff677a0d72e470939a
SHA1: d15c89d1db38d79217acf870de52e671828280a0
SHA256:34ed5c83b62baed8dc41489e46b866ef73d54337144482ecd6996db159e08d87
File Path: C:\Windows\System32\offlinesam.dll
MD5: c9eec93aa873cef128e2bec4b6a25aec
SHA1: 28ed0661740454956e66c95341444a361562f16b
SHA256:1ca916cc97a8c7d5bfc49b2834a06c5e741187973891a7d43d048ae555c364a6
File Path: C:\Windows\System32\offreg.dll
MD5: d9fac74608fa8e3cd3869edbe66f0f6f
SHA1: 5be922072d5e1463470bf6f3aa01e9c8791cc083
SHA256:874538bf9b8ef421fbe2108b8a2ac5669763885a6e445f2bde37b37b6cd1f76a
File Path: C:\Windows\System32\ole32.dll
MD5: 9b9aa2f761f9c96f1c8d7b6ac6f918f6
SHA1: 1777b6f58a03ea5f3c577f1f64b139751107fdbe
SHA256:2ff2022ffd19510ac7568719370df4c3d6912edbe70b47eb8a990b47e878d1e2
File Path: C:\Windows\System32\oleacc.dll
MD5: aae9a6bf186f399f3b883ad6e4aade02
SHA1: 606c5abc1f43acaa64e8c6f7a103124a2ff52c06
SHA256:eae80a9aaeaa3cf42a5fb81c2e188ee22b3da5a48a6be779d6d899c5adc85ee9
File Path: C:\Windows\System32\oleacchooks.dll
MD5: b9a97a560f9a3039f1246b91e57849c5
SHA1: f7f3cd8b0810aa743455edee3e1827d0601b9a40
SHA256:d02e2df1893856a3294a8418fbee70d214c11c7019c2e678ea6948cfba2cbaa7
File Path: C:\Windows\System32\oleaccrc.dll
MD5: b2e8f15407b6e385a80fa084b4e37e0c
SHA1: 61c1a5adf4ec0c8d3388c7d94626306f4b6c8530
SHA256:774c253e5d872ace88d3052d8d4ba64d109015ac55a7cb9e45c06238f5f13363
File Path: C:\Windows\System32\oleaut32.dll
MD5: 95c8e41a64f90c89dce4ca64b5efbd57
SHA1: 452475320f051f4293275361426a1964c3be846e
SHA256:4dd40579e7254dd553b49b229aa85b9c079586b034e37e564909da25eb298345
File Path: C:\Windows\System32\oledlg.dll
MD5: ea22b8bbfef170084eddcdb239f54f2a
SHA1: 658a1d5ddef800d33f5043175f43396e33cfbfab
SHA256:119a3c5c03f6756ceb30bf6ea1597d6a981dbacebbefbfb9b86553a9450e1d15
File Path: C:\Windows\System32\oleprn.dll
MD5: e0f375597c9bc2d444be3dc6a65f06e9
SHA1: 11589152b702675bb211054020e33f2659c34842
SHA256:3e595c971729c2eb7879b6ce468d11e286ea98fa8c1abf93abbc5888542013d0
File Path: C:\Windows\System32\omadmapi.dll
MD5: 640944b68fc864c1521796e05a2ef366
SHA1: b69564cb922699e08800b750816858619c09870a
SHA256:f591e968248509ade9f15e0a58fca2ad1cbaac81113ef88baef499ff9c66352f
File Path: C:\Windows\System32\omadmclient.exe
MD5: eba613ba99014381550cdd9041a257fa
SHA1: 9f90b14d64fce646fbbd710e6925276e0d2fbaf9
SHA256:993f2023f6fc94230145272c71da8e7d2da2dc4349f62c71471bcd207b4569a1
File Path: C:\Windows\System32\omadmprc.exe
MD5: fab98e7b06a5be6c9d902f491b0d5648
SHA1: ff91fb31ae166b7b53701886d5be38b125cdb72f
SHA256:a06d64ebcc5b79f27b78332e3423c1685d6b77fb8c721919af173113f72e92eb
File Path: C:\Windows\System32\onex.dll
MD5: 2ed092887f1a3c6f33990599bdc6cce0
SHA1: 31b7cf4c417409a68014441cb794cb4047ae6444
SHA256:f402e2427947b0584a48e9a3d7db5910b29e0981abe715ade40d37e0b4c98cfb
File Path: C:\Windows\System32\onexui.dll
MD5: 766597058149125847962eecf0c6dac0
SHA1: 3c75ac9f8ff661f133acb9dd1a8e210a9a0a3d0c
SHA256:6b877d6bb0fb40835fd4494003b14377feeb8a304fa1a850f0067b4c8cadeefc
File Path: C:\Windows\System32\onnxruntime.dll
MD5: a8283f0c13f681956daf369882e478eb
SHA1: d5aaa73f738e5c8377dee65d522e43b3f7c9c5c5
SHA256:09ced31cad8547a9ee5dcf739565def2f4359075e56a7b699cc85971e0905864
File Path: C:\Windows\System32\oobe\oobecoreadapters.dll
MD5: 0c4d71ba3bc1c8719a2a718a19ad070e
SHA1: d4f4c07a58535d02f0cd035ff5d07e6aa02c4736
SHA256:8bdb7b1406d4b4871cbbbd2de16e0b09c0a1399dc7a4d16ccf1ccbf4d0e6e3ce
File Path: C:\Windows\System32\oobe\oobeldr.exe
MD5: 8c90d807facd0ad8f72864a14b470019
SHA1: c51346d35e58d7160eadaddf5750a89c50607861
SHA256:fb1090708026119a3d408cd2b8b3656d06ec303c52c390ceb66496c80495a01c
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\opencl-clang32.dll
MD5: 8695e4d75933d9c3db9bcc6c36e37b0a
SHA1: 3de978145351932fdf0644437f7923f0645aaece
SHA256:06824a243f4fb793a05bd3ed8d8fc836f3f5100805089286311286447287e36a
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\opencl-clang64.dll
MD5: d15081c387beef6136e589e972a0160b
SHA1: b49568c386dd5de809c00a66c97948b6356f48f2
SHA256:8628957ee2c18774c920f52c75b12e90d8719bd9282a70a72e8c792c823b1851
File Path: C:\Windows\System32\DriverStore\FileRepository\rdvgwddmdx11.inf_amd64_e13e2b9679795ab8\opencl.dll
MD5: e872b93bccfc903f995250ba0533082f
SHA1: 01cb51b61f5d26e173f3f0f39f33ff597d0e41ac
SHA256:9a2f8aa5d9982089015e0f7d1408b1bba466bac7214fbee036511d0c3fed6206
File Path: C:\Windows\System32\openfiles.exe
MD5: e9b42270f9d7c5f8f11c1fccacdda2b8
SHA1: 03837335a68e92e907fd46ca3bb59094abae0081
SHA256:f559eb1de240cc388d2d1b612d45b8ad962822783fcf36ec8c541ed0f29c9d48
File Path: C:\Windows\System32\opengl32.dll
MD5: 731b221d5f239e7de8b673c3d9b88086
SHA1: bd22bac0668e93f263f43665804664d50b532f0c
SHA256:da9bacd30ad5da35166d193e657dd3792472715ae0995efd753d1dc6e154502e
File Path: C:\Windows\System32\DriverStore\FileRepository\oposdrv.inf_amd64_9090a824ce0d0e68\oposdrv.dll
MD5: 3c830e5d92d02016acec4b40e4e1942b
SHA1: f77af16fdb5f2912757e843b040dceb354c25792
SHA256:fa473e4aa51bf69a4023a9c0d33a0e3ea3aecea6c487fa45db5e40b7cab8a434
File Path: C:\Windows\System32\ortcengine.dll
MD5: 1d7fc8a9241de652e481776e99aa3d46
SHA1: 175936d4706447d8ac5a30c6964a8ad8136d10f2
SHA256:78f39ebbc9307b823296f7c37ec387fadf7cb4e9969449833d90366a65865752
File Path: C:\Windows\System32\osbaseln.dll
MD5: 9b2b6ee5278f79c1087a3a215a8b7b7e
SHA1: e65c76728557ecfc4257315e656a3d0a16caecae
SHA256:864bf27f7c3461a40b5aa645c6b61210accb6e4c0ce5cbc7baa7b38f4c4f8a84
File Path: C:\Windows\System32\osk.exe
MD5: 188313a02c8f83027c946acab7ca3b63
SHA1: 48072cb2d5286dc8253cd6f2df19338a71bf984f
SHA256:ed605dbdd969919e44309638d22eb2999b9eca2a77e2bc09f6062b0b1faa05aa
File Path: C:\Windows\System32\osuninst.dll
MD5: f3f8126df4983a2a1ee8f83aa8f4764f
SHA1: 5d2155bf2b97066813ba7d82ab1f2a776bb1bcce
SHA256:b03575fb8956c41609ab097ae67eb8bf8e0508b4095ca9fd3995dd4668ff1e56
File Path: C:\Windows\System32\p2pnetsh.dll
MD5: ad5d999bc1ac0f2644c8cbab2b317fdc
SHA1: 8ea86842377d9cc914605019a8ed1c3165c246f1
SHA256:29660804047ceb18254e8f4a45ce2928acdf61f2d97a2ce841c690999331113c
File Path: C:\Windows\System32\p2psvc.dll
MD5: 90e97165efbdb4c13a1accaf65f9f08d
SHA1: ed909408de18d89f29ede6805159f90e026787ab
SHA256:85eee4b7b70f0885ae9dff41f4045067ea9e966244838bead7191b897779a1a8
File Path: C:\Windows\System32\p9np.dll
MD5: e22a918c28747128f1f67336d4ff5481
SHA1: e1d5b3fc85b27ffa63bf44a4cf5f4a5a3c2beaa5
SHA256:64ee816da88aca82ed334e160f1bb3eb181565f8511718e9a5e3a4d86190f226
File Path: C:\Windows\System32\pacjsworker.exe
MD5: f8dcb9e8f2a16cd0c91506cc876f88df
SHA1: b2b804f64bf2252ff920b502c6c9ffa33a505396
SHA256:8653314800feff8d6c76e499c97555f26c8c7c7df1a756d6446206e5ada70bdb
File Path: D:\Bezbjednost\bsep-kt2-front\Project front\front-end\package.json
MD5: 66cf992cd445d67d03bdc88e9a2ac1d6
SHA1: 5dace595c9b4eed09a206dcdfdd4c2a1a6d20f4c
SHA256:31070554eedc7ce27f31d2717098edda99452d5fe5794029f667b3b1c920af63
File Path: C:\Windows\System32\packager.dll
MD5: 1285a37a0b31cb521a8be611eb495b87
SHA1: fc02e9935853de7a8e2cc1e473d3fd7c7e2151ac
SHA256:505baeb4a9b1a4d872f66d7f666d60fc819c8a97a8eb20c57736fd4f29c25ee4
File Path: C:\Windows\System32\IME\SHARED\res\padrs404.dll
MD5: cba9eff8fdffe71bd72f9e34b8c412d1
SHA1: 78f8bc7f728de9a940d6dbf64d3c290db2996c87
SHA256:a4787044cd67c4a1f24ec92ede1ba1bbf0ed68e3822ac848514e7e0539516d10
File Path: C:\Windows\System32\IME\SHARED\res\padrs411.dll
MD5: dbe8ddd674623d0ad6461d70e7b4cc30
SHA1: 8a3f2a4e016c527a19bace40cc320c4bfccb8753
SHA256:701d421aca3a1f9e406e9ada629b0c7c319c712317fb911b9a147e8e2b46745a
File Path: C:\Windows\System32\IME\SHARED\res\padrs412.dll
MD5: fa03623ed74e112eafd268ac5db18edf
SHA1: 0f4bc54ff2d21b1b69ba1502ee9345da3aad7efd
SHA256:fd99a2473ac1b91d9057d6dd5ea80c7c520c1f34ed3daaf415a306e9acea567a
File Path: C:\Windows\System32\IME\SHARED\res\padrs804.dll
MD5: 48e1f5ec593518ea4db0449ded6f2921
SHA1: 6636ec01940f3abaa2881b56d89baf9ec31d9afe
SHA256:5e4fa6dd9f7353ec704a234c38402ee39c2bd67f607b52a14cf4f9531535e83b
File Path: C:\Windows\System32\panmap.dll
MD5: c3f21a1cc9dc3cccc38491da27273f11
SHA1: b59cd05fa587eb37993e87359d26a9210beebb01
SHA256:cdb271b988bf3dc272ad93c272c446efa981c93fe19b7cbee8d2f01fb058a005
File Path: C:\Windows\System32\pautoenr.dll
MD5: 5d24c1565593c63088a2a4d7205732dc
SHA1: caf2c5154288ee0b9283874d57af14578e1b2a2e
SHA256:97238d08db2635c160698f9533eb58f37627b6c56c094f04b72e0cbe2afff1f7
File Path: C:\Windows\System32\migwiz\replacementmanifests\Microsoft-Windows-RasApi-Mig\pbkmigr.dll
MD5: a75114cc4a9ceb6d74250d3f05cdccf9
SHA1: 3810be9a1364a51d6b380f740697334a2070df6a
SHA256:8690dc389e6d538ee05605f552198a73f4cd8b54da069bcf29d49273674ad51e
File Path: C:\Windows\System32\setup\pbkmigr.dll
MD5: c23b51110883ab62f1f030bf1ddd7963
SHA1: a6d17b756340fc08a07043375be5f522b6b89799
SHA256:f3b147f68b111e668d1395577bca255dbb902830dde33f7708b092534d6efbb9
File Path: C:\Windows\System32\pcacli.dll
MD5: 0704bceac096def2fd08ef7741cf53dc
SHA1: 819e7ba64edd4746ee24265339e5492f894218ce
SHA256:6292ae4fd108fb3f1bbde3c176c2cbb0894b3a3bb5db11c533487c0afb60d73d
File Path: C:\Windows\System32\pcadm.dll
MD5: 207db8785e1d2d453ba0211fdc072708
SHA1: c72def5a8d2d30390ed9f5fff7e152ce3908d6b5
SHA256:8c44996b778490efa5eb9f70b60a1089839f94913f0218272e41c0966c2bb801
File Path: C:\Windows\System32\pcaevts.dll
MD5: 5cf9e11e3fd14de272f180277176ffcd
SHA1: b6e0a7e9475190c9663b1b9e9f56b64781553775
SHA256:b8927cf4bcacdcf5b4d0aeed745665b9038719f9d3f06825ab17b3956d13e3de
File Path: C:\Windows\System32\pcalua.exe
MD5: 25b2d743f514be5ee06c5ab68ee9a6a5
SHA1: fa8fb48189cfcd104a3d8ca1eca57cc159e39ddd
SHA256:884a373ad8b032dbb13abab2194dc7d1a4b320ea632f3d64f974c8b3ba2da681
File Path: C:\Windows\System32\pcasvc.dll
MD5: 3f3b11ad2c13c2a4c05055b78be8c911
SHA1: 6cdbf4bd5c5cb8da6795d66c37e88fdc54f369a0
SHA256:85ee14506da5523e8354f00c771733cfc3d691ead7ca9549b53937a3298942cb
File Path: C:\Windows\System32\pcaui.dll
MD5: 85213333360e51020881c512f878f2b7
SHA1: 8610bfb8dc39540fd3b639778dd3ef6eb9da0bf5
SHA256:99e5219db20c59be913495dc8766772d1c26d81ff2a3d3f61a42f1d9a53933ac
File Path: C:\Windows\System32\pcaui.exe
MD5: 1f0e928478ca34eb052d4ff06e2e210a
SHA1: ffb0db8ef7bbe15dccd3f3ba96d53b48402b7767
SHA256:1b1dc9e22994f1a4f17295aa9d0a85edc9ada733f10e75528c2a3f1aab04e6bf
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\pce.signed.dll
MD5: 33ebde5289829bf8690b92bb60e61645
SHA1: aac012cc6eb57cc0d5f872b479bc999aad5a3cc6
SHA256:4fe6a070a8de43fb7906a18a9a175f993c42ef3adfa4ee31d6e34595ccb1d884
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\pce.signed.dll
MD5: 13bdb34ea014f1ca8b2ae6c11cb23012
SHA1: aaa11ddcc609cd70d68fa9b6b3445ee337ce29ab
SHA256:0999d03485959378ddd8db2f8b78c8be865b85955534586efef8eec37a44b6e6
File Path: C:\Windows\System32\pce.signed.dll
MD5: 36cc8e5acfc282b9d18a2bab5d9021a2
SHA1: 997507b6bd28fcefc3270b6ea82e2504a7c2cb3f
SHA256:228c7aad8d3db8887a773ce3d28b8a7193b86747dfbec59500e8c8890ad1ee45
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\bundles\pce_service_bundle.dll
MD5: 409633bd13bc344116159436339ea75c
SHA1: 9afdc0a4ec357f00fd0e8bea1073710c7b334558
SHA256:54936d1d5e11118812cd218752a14eed08498f2917b9afc23c98fd5747b453ab
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_d372a4ea3b959b1c\bundles\pce_service_bundle.dll
MD5: 6870a7c5e3cf2e543c350b9ce6e699e6
SHA1: 7fa6dd9b5db601faaa5bfc620874a64b03529d93
SHA256:7245157ccbaabdc65fd1f009175e372f73f7c7e0414a9b9df5b35a8355e81bbb
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\bundles\pce_service_bundle.dll
MD5: 4e6433ca166921948e40767f77e3929c
SHA1: ed9bf76e01daa0e0a6ae84d70b28e90204379733
SHA256:d61a15f6120232bb345731f2175f39d8172e47df499a761b3278359bff917b69
File Path: C:\Windows\System32\pcsvDevice.dll
MD5: 7c956bc327392cbea28aff420a2d13c3
SHA1: f39a24d1715b3bf296398b8137e54f5ab4fae0cc
SHA256:790bc9d3931000dc44e9644d410eb2f7fef20116e10d04236cb84c7a0f153d9e
File Path: C:\Windows\System32\pcwrun.exe
MD5: 73e513b8240c7415c33f2067ba0df971
SHA1: cbfc0cb7cc896b34e66dfbf559cfe46f6402f695
SHA256:a1a3b5728a6a3a5f059b09ced443007bee62450bb3773d1fe6c3f5dcf41f0c67
File Path: C:\Windows\System32\pcwum.dll
MD5: 642d98f94f04a764b0fd6ed931ff6bb3
SHA1: 8ae640ca0f07db4c23c3e07b12270337a921e33f
SHA256:e72268a93a94b68b749c146d02918635440ff8440c64bd939d9fc5f9a62e0a36
File Path: C:\Windows\System32\pcwutl.dll
MD5: 96ed58854a0d72bcb85ad97fe0ec2cb1
SHA1: 895b5a28483e971dda970dd1b0d9457f66fd240b
SHA256:734d6134f5df4682d6d179946cbbfabf6be147e7c3bc836bd7b770e1798758d0
File Path: C:\Windows\System32\pdh.dll
MD5: 087e244e61f6d00fc3ccf794656c0edf
SHA1: 944a691ff7582e6b5a344e5c83da53117dbac834
SHA256:ac8620883c73f9ab2bf24311222c261d60e82b36b4f4cfe3424eca0895ee945c
File Path: C:\Windows\System32\pdhui.dll
MD5: 2b0e1517dbb0e067d82fe2d47c372a8e
SHA1: 67a80548f78cab22cf81b93f3181d689c44b26e3
SHA256:6cb757959ab8200999ae91a0ccab15967fa1ed101c90de195e26397b6ef6c070
File Path: C:\Windows\System32\F12\pdm.dll
MD5: 38f7a8533d86ed824ee500f6a27ebe9e
SHA1: 7bcf6bf02139227bfdccee385d34d107a9e8992f
SHA256:1ab9719df32a2d00bf8814512457d5763b1c20f83d993eaaf764d2d7aa65e670
File Path: C:\Windows\System32\F12\pdmproxy100.dll
MD5: 6fb8467dbe52ff6dc0339ff440103d1c
SHA1: cbace4de656f8370f62f0fc337c351c717dea835
SHA256:3ab88d17ee5511bb771888e3373c669fb3eaaf3a56a51598d026118ce69f2727
File Path: C:\Windows\System32\perf_gputiming.dll
MD5: 240ddef65b35a0b326e83f6bcb8e97f0
SHA1: ca1da7557a35f9626aac126720c3729959f8a150
SHA256:91df67e3d8056d03d48678e91bf8f6a58a6cd23cdf1aba69b87f5470a71cbe5e
File Path: C:\Windows\System32\F12\perf_nt.dll
MD5: c9a96451cd0a2d2d2a4bdfec209c5df4
SHA1: 9052345d323bb1c85b5ac3841fcad79a179effef
SHA256:f024de4c2a44108b2105258d2e426b10d34265a48c7fe832503e8ed17ef73473
File Path: C:\Windows\System32\F12\perfcore.dll
MD5: 20b5d4b2873ae2493654af4e93c8324e
SHA1: 945fbb68bd17badff7254f06557b0f8d48663fb8
SHA256:83aa5147c5ef57190679953becf3c1e2a4fad1d1260e9a036efcf4e62f7cbd08
File Path: C:\Windows\System32\perfctrs.dll
MD5: 2a6a152b839e645b98b5c1cc1656ac8a
SHA1: 093e144cfa91b928142ddfd6eb7f426df9e8f2cb
SHA256:f8d807b355ec3381eda0c9b46306c086788e8dc793107aa60e66106cea6b85e0
File Path: C:\Windows\System32\perfdisk.dll
MD5: 3556d2c37cfb8247fa51c3b9fd21a913
SHA1: 4e1c2dd301e3901bab22f260f1ca0ad14638ab02
SHA256:00319d685c9599e466772b8c0a50fb5e21f0f7e429c2762872d9980af4aada67
File Path: C:\Windows\System32\perfmon.exe
MD5: d38aa59c3bea5456bd6f95c73ad3c964
SHA1: 40170eab389a6ba35e949f9c92962646a302d9ef
SHA256:5f041cff346fb37e5c5c9dab3c1272c76f8b5f579205170e97d2248d04a4ea0c
File Path: C:\Windows\System32\perfnet.dll
MD5: bda570d410876680a24a43182a3f4271
SHA1: 880ec425d0b5b124572dadac6dd1a346b8b9cf2e
SHA256:415f8e1292af7c573bc5c5ca7b6fb5d34e63192aa6999284f5d6e9693c058bb8
File Path: C:\Windows\System32\perfos.dll
MD5: d923a0640296d052ce4896f9f0f5c0ab
SHA1: 4190ebb4cfdc6b7e79363e61af34401f77312d28
SHA256:df18001a01f27813fe59bcbfe7fb3f8830105e14b1719b53000ed5de5064a5ca
File Path: C:\Windows\System32\perfproc.dll
MD5: 518ffa5fa811b399c2b4996cb2bc7b79
SHA1: c446e69a079feb365768a18afeab17fde108c934
SHA256:48c60198a38841ff59c1ad7ebcb8689b7049f1d5732ff80178b8c4255cbfd5d1
File Path: C:\Windows\System32\perftrack.dll
MD5: 62b3249f444ffab03745665af088e790
SHA1: b39455828ca428f8e9b1f3c29ec09569cbc06fa7
SHA256:04afb1e6e877cea2cfd7973bf4eb680aa4751d73db25d711304c3ac380ce8226
File Path: C:\Windows\System32\perfts.dll
MD5: 38358e1a89427387bc8e4299046f35da
SHA1: 6906659b50b9a4837e6b4ab89b089944b1676541
SHA256:cd17fcc543a9fe079b6b2edad3052a0e7bebb7184c4b804076abe2c6d337fb75
File Path: C:\Windows\System32\phoneactivate.exe
MD5: c288d3d27d7ba8b181c6bb27ad304d58
SHA1: 8f3f44d7ae1fc02b25f5da512236058e16343c51
SHA256:9f90dff3b07b1606cd122565b902a1d11e9177e04663aeb97aa8eea464e39291
File Path: C:\Windows\System32\photowiz.dll
MD5: 67d990655034fac2ccc712384e0f7d80
SHA1: 365749f7262b3d2829ae1f8fbb52c20577a7f494
SHA256:487626de166380f579d42ac80ba0388d5629926a782f234f92c899930e572e20
File Path: C:\Windows\System32\pid.dll
MD5: 9fad2937691257780325fd49bec97d3c
SHA1: 66ddafdd4c1a7c2736173b40459f82ddc1487726
SHA256:03f3481453cdd985200c09fb9c43dae8773e3cb3c4abe015c60e6637b5131b73
File Path: C:\Windows\System32\pidgenx.dll
MD5: ffa3f62b4df0d2771e57a840cf487253
SHA1: 09673784b075037ee1a85dbc68093c532f651008
SHA256:66c6154af2836dfdd131ac42580578169e3ccaf9c949e7a262eebcb54c8ac43f
File Path: C:\Windows\System32\pifmgr.dll
MD5: 9b0bf8d01b0fe7132f7bc6eb031eb46d
SHA1: 200e768832b3d1bf345d930d1328f0528399c0c4
SHA256:3ef4edafe8d587a91ef023b470e84b2b05c0327d4ca6701a34d5e0ab0ad0bbfc
File Path: C:\Windows\System32\pkeyhelper.dll
MD5: 19f7d9f5ff4a9c92d774dfd32896510b
SHA1: a0a0eb7cdf8e54299491ec11368a3ff60598bdc0
SHA256:dd4e6a4c0426ac63af3103fb8e1bad62c16bd9b7b1317283307d0a8dd9be9435
File Path: C:\Windows\System32\pku2u.dll
MD5: cb32c0324247cd02c8e532368babb034
SHA1: a7e2a6091bfe37f18e4729ebadadf28103524dc2
SHA256:0d698b506eba7ef5999c86dd51d92892b539b33089cc7ecdf6c64631795ae177
File Path: C:\Windows\System32\pla.dll
MD5: 9e431a5d697432dd6f4db48c9a185104
SHA1: 89c423a3a2a8e35e86ee42ac64825355fa238387
SHA256:44c16e194258c9143a45f4022f9c5de229e217d6ff7f944f105fe631be9ef4a7
File Path: C:\Windows\System32\plasrv.exe
MD5: 9c338b7dd0916e2e282e15b385ed0716
SHA1: 92b157cd2ef81c4649c491c4fc76c2422dce45c6
SHA256:2d1c235ddc76d427c48c39c22e6dc50141f09734270eaf01778713f987e99cc4
File Path: C:\Windows\System32\playlistfolder.dll
MD5: ad565d864effd245dee0f2320da9038e
SHA1: dc8c918a641c3442b2b9fa532f940479ce48c879
SHA256:8eaf579e1b8d15cda19cacd5ba8581ed8dd718923b2d6fbab4b775d60e6e5de8
File Path: C:\Windows\System32\playtomenu.dll
MD5: 0b91681b9b43e410ef5e680d82437df6
SHA1: 60a63e1f13f4ca804ea84112a146e69b1cfc829c
SHA256:c84738e211cc863e3b31d49d68188529f6688f7f2a772770a00c6c94804c65d4
File Path: C:\Windows\System32\ploptin.dll
MD5: 8dfe4da01c86302663e01f96f8dc9eb5
SHA1: 579ddc393da69901b7ef0f92262a425118934f41
SHA256:26cafdc34f42c7e13a744f3ad52ac8ba5af92a01bbf58667fffc849c49cb38c3
File Path: C:\Windows\System32\pmcsnap.dll
MD5: ceb6072de7eba3fdbffd1ca46ec9ce6e
SHA1: d60e9bbe4c8d47a1b559b7854498bcc69b86e626
SHA256:5b32e7cd7761c82f16fb199d36d44a39e106e531adf2fd95dc94e9117559fc96
File Path: C:\Windows\System32\pngfilt.dll
MD5: 88c42af25fafae6f6dbebc2f0aa7b81e
SHA1: e73754cbccc9ebdc03732d93bffd784f27e7132c
SHA256:5db03fa97718899a4e0c1d1b25ac41b5359687ec90f7138d48d97dfb76ef474f
File Path: C:\Windows\System32\pnidui.dll
MD5: b979b06cb92dca88905716efe600e9db
SHA1: 41ccaf72bf94294607bdfdc34f6c0035d91faabd
SHA256:0886ced0200c7fd56a0444acf550c3e1ccae546681b1be610fa645ec18a3e1db
File Path: C:\Windows\System32\pnpclean.dll
MD5: f0879539bcc78f086bdd6665d98fb4b4
SHA1: e87418ce9c5df463d50fb76f81fd7be5321344c9
SHA256:25fe52e3687e26b9e512768c0a697b7a602f6d5b1f3f64d3a1b915fcf6042cc9
File Path: C:\Windows\System32\oobe\pnpibs.dll
MD5: 80877dc8138fe09126e2fdf897516667
SHA1: 72bb2124dfa5d9773c04332cc903a2153b74624f
SHA256:efd976d373a578e508c54e494dff61a49ba65a807dfa62d949693fa6f8752e89
File Path: C:\Windows\System32\migration\pnpmig.dll
MD5: 78a37bf865f42912d0e90b61eaddc41d
SHA1: 9d9b2bd312befe3d2d0841541f7d61fdbf75a4b1
SHA256:d8605af25d1924fd564faf9337a30c55ea6a5c92a5928b4603e260271aba2433
File Path: C:\Windows\System32\pnppolicy.dll
MD5: 5f133bb2a59e15615ab4b38120eb24a7
SHA1: e51cd378e388932a43dff3363f5efbf861675200
SHA256:e76e22ff61870e1c0b4f98d8b8479f3a40c5a623d0df0dc7f17e3a6fb47798d9
File Path: C:\Windows\System32\pnpts.dll
MD5: aff43ba5a1427094dc6ae9b6595c32c3
SHA1: de28628b91fb5aaa66d8cf49c128a7e98d77263c
SHA256:987344093b78b5d4b64eb6aa818f1deb26e1b6923f8dae00899d47aac1f0f2ee
File Path: C:\Windows\System32\pnpui.dll
MD5: 3d3c3f2af0b975fda5ed8691fd105e0f
SHA1: 0e663c1438231aaa4d033e9b2b71917feec6ecd9
SHA256:526bff2e970ef09e4f01053598105f92150d439ceecb04e1ea8f254b253decb5
File Path: C:\Windows\System32\pnputil.exe
MD5: 9c43a22504df885b638df89171673151
SHA1: be974471aabfd402da1aee0b7bdc81e1d1122a6a
SHA256:36459ea134477201b2a88bbf6909a6a45cc1f12b75b08183b0b421e52abe9b8b
File Path: C:\Windows\System32\pnrpauto.dll
MD5: 6aaac8ad69aefbe5fe04738b687ee85e
SHA1: 77decb9bbdd0553e25b92a1fe6bc7b26ed5e22df
SHA256:83427082298e2fc021d5d39a43db4a5783d95213f2ca8d3a997db6c815bd9cb2
File Path: C:\Windows\System32\pnrpnsp.dll
MD5: af074c965e8d11c56d6d0f1cdad54f78
SHA1: 015a75a2267d6c30fddc74ada6171c89face9c5f
SHA256:dc26280d2a1f7a6d414c917f4f0ae67fdaace023e683fef548488e3c8b68dc17
File Path: C:\Windows\System32\pnrpsvc.dll
MD5: cf9637a972ab9827c6bdadd493d93797
SHA1: 838e0ced8be781d93b2a400a7d5df30a2402f844
SHA256:57a8dd76947cc8cc0e4f629187ebce15dad028274de4186870629aed02ddddc9
File Path: C:\Windows\System32\policymanager.dll
MD5: 829b860e940183bc46b9556ce166ffc5
SHA1: cf1468c8ea3f7752862a07e502dc8d67e5e7d9bc
SHA256:92833c0a16b9f34baaf0bec8bac8efb2f409a490b4215a2617ddac87ecaab282
File Path: C:\Windows\System32\policymanagerprecheck.dll
MD5: bf407345663279cc62f0e866dc4442ad
SHA1: 9e954d640939129ae3be5d4939c018cfcc4a4b1f
SHA256:95bd36d26f7a375ff62cc3945f104c16736be7317c3e34c4e6ded66a83351df4
File Path: C:\Windows\System32\polstore.dll
MD5: ddb6ecb4c7dd5f93e365793292743d76
SHA1: 4a36e2098b71e07f3168e7d748374c92f2b38ce0
SHA256:20fc68cc3e144192626cd4129b7a9962b0c1c6cd72be6aa805c04d2e0955e7a6
File Path: C:\Windows\System32\poqexec.exe
MD5: 6c0dd61caf7449b9e4feab4c39f4ad69
SHA1: 5a11bf00c788c58f7da1fd057f32914dddabef1b
SHA256:5a088907a5555fb0fcec2dd2737967a45ac52f739c37492a25df1041605a8957
File Path: C:\Windows\System32\posetup.dll
MD5: d5d681fefd0fa5bb7cbde860e922e84f
SHA1: 3d0361329d6600bb8b422f59b9afba20af6d5db6
SHA256:f94f1e811d780c734bbe308d030178036c255f757699fafc292d4742fc1bf425
File Path: C:\Windows\System32\pospaymentsworker.exe
MD5: 1a66038642edac106d9c6e8c118040e5
SHA1: fd768b016e74df1835e48e467ac233418f4ff94f
SHA256:786274cbd9e209b00ae4a7c3a4c9fc6f6dcf65d9bb3faf54ee743780a1285c96
File Path: C:\Windows\System32\pots.dll
MD5: 23a322d03405dacf969ee3fc1184fc20
SHA1: 60b77d1b83f6ba3f543e94231914bc146895620c
SHA256:5b9615e693e140edfc0944e4f7cf2938d09ee45b0663c8c50e31a54011105416
File Path: C:\Windows\System32\powercfg.exe
MD5: 9ca38be255fff57a92bd6fbf8052b705
SHA1: 9adb16a18ed1650f5f5a7e6bd83dbd3dfd1963e1
SHA256:cb2459971a56cee45a30346281ff3b0eccea0c2bee1ae6b8477712404d2e6ae1
File Path: C:\Windows\System32\powercpl.dll
MD5: c7a32bb6ce30e9c3366e610a750d8f3a
SHA1: fddcea30176e29071b34fe4f11a6cda10199b1d9
SHA256:0c4a2999d81cda2f87fa05247e305c9f862e7b2a0c427e88301618c064215c6d
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
MD5: 2e5a8590cf6848968fc23de3fa1e25f1
SHA1: 801262e122db6a2e758962896f260b55bbd0136a
SHA256:9785001b0dcf755eddb8af294a373c0b87b2498660f724e76c4d53f9c217c7a3
Description:
Windows PowerShell ISE
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe
MD5: e05920670516cc96822699e5688a79fa
SHA1: 5f2596b6c147e13a32c7d73ef1c1365ba0171687
SHA256:1172951d8b1aa4cf9d0ac9f72ae344c5896ce4286c790a1f0dff8a6f71a5772e
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.CWE-354 Improper Validation of Integrity Check Value
Vulnerable Software & Versions: (show all)
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\en\powershell_ise.resources.dll
MD5: 1c6054bbcb8258c80b01c9303c9cf92e
SHA1: 854e0fe5af54201f0ae8449d8e713a174d1766c6
SHA256:116f36e2a1a93cd4d726f6ae7ac8d4ee53db21239e60f217c03b492a1e1afad0
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.CWE-354 Improper Validation of Integrity Check Value
Vulnerable Software & Versions: (show all)
File Path: C:\Windows\System32\powrprof.dll
MD5: 5e5616cadb11c91cfbadb7c54468a89e
SHA1: 2240294d1ac6e7342e2b2c30237c8244f50887e2
SHA256:d345ba79f99d3ae766875f147fb30e23114e3ab66daf05bb622d9d0437392641
File Path: C:\Windows\System32\ppcsnap.dll
MD5: 482064a689d56b69ef2465fc74dbb205
SHA1: 37051683c92748493f5da6326ec5b9b647601e4b
SHA256:3f8a508a40de6d6faa231096933bb02cfd6573625bbdc2149549a598585f5dd8
File Path: C:\Windows\System32\prauthproviders.dll
MD5: 3ef0c381b3536759ad21f7429b206e33
SHA1: 76ed69cd68679181511ace34c7d87abfc2f39e19
SHA256:7f1d3b00943182879532c70b47a17694f36a52df846cc6c218e61a65e5ecc518
File Path: C:\Windows\System32\prevhost.exe
MD5: 19efe4856be29eefeee2852ddfad7bdf
SHA1: 0f38fcc8ffe0bc23c1edccbfbc2eaf32f9e9e9f8
SHA256:b603d4652c59664157a1a045c5fae16edddfb8fa3f702c2ea189b0b4177de1f3
File Path: C:\Windows\System32\prflbmsg.dll
MD5: 54fb96ffb3e2984755f82cfff72e317a
SHA1: e569e22624267b38abfe33a452a1f7657848ea13
SHA256:73b88e1238ab71ed4142952f06e49d230f611c28ceeac263820f6af148d2965b
File Path: C:\Windows\System32\print.exe
MD5: b7a3d9abb6cfdd162a1179d990f6f4e3
SHA1: c7decd4aabc095aa67fd9d5815fc591784609a0a
SHA256:5b13be2f03989571679de0a4706510fd270950b53dd96cbe57ced49df7687937
File Path: C:\Windows\System32\printfilterpipelineprxy.dll
MD5: 99869536ff94b20db3f24c21c5383330
SHA1: e9d5c4256ef5ae203d03c7122e3bad911a3a3640
SHA256:7437abb8ef32b6bd366685e787691e9637a4e847edd7899b72f0982592428b80
File Path: C:\Windows\System32\printfilterpipelinesvc.exe
MD5: a4d08e86166fe6a9bc5093c16f5bb1e2
SHA1: 2e583ebf4f9b5977fac32053f193c20b14916da6
SHA256:e5024090862f244863bb925f22b3486b5daea73b523d72778f6cb3a62f5cac08
File Path: C:\Windows\System32\printticketvalidation.dll
MD5: 73a67f8e4b4cb0ff633a197b057db97c
SHA1: feb8d9ccf5af2f344beb3203033a8cccb27c31d9
SHA256:985f9b0edd06f382b7736826887df4f1b1e7278cae9f1b5963f597e2b3fcab3d
File Path: C:\Windows\System32\printui.dll
MD5: 75714866ffae197d35775b6739312a3f
SHA1: a282d792725eb53123620cb50feda37f1347214e
SHA256:c450d07feb1584d27be25f4c1489ed0c9eaae37d7c506bc751e33a2dcde73444
File Path: C:\Windows\System32\printui.exe
MD5: e43252474adf63e69b1fc65d202d88c3
SHA1: b1fcb1ee3cf86816ce749e40127329fc857a67a6
SHA256:53db039d9d46f2f3f80df42c8ba48bb96ce4fb96c1bfce5cd61514a7ff369411
File Path: C:\Windows\System32\prm0009.dll
MD5: ee84c818ee8488c2a17cba090db5c1fb
SHA1: 0a7664e6fc6f52e609b9ccb2814ec3ce8422acb9
SHA256:8661b4e72de38df01673dca81ea1daa3988fa9d4d5c5fec33b162673c8ac44a2
File Path: C:\Windows\System32\prncache.dll
MD5: 8ec0cbd36b8ff4c3fe124e38a3ca7610
SHA1: 553ba7aed3aa5ec8c2b27cf972375230c9daac06
SHA256:5ecd7a38e5ee78884f80a35c45a63a977ce7652a25324d9b828be3e9c75bc3f7
File Path: C:\Windows\System32\prnfldr.dll
MD5: 81f09c87eba804ed9373c17534936825
SHA1: ca34c5282f11a90d9132dea654d8c040ad7a4482
SHA256:2f4c85bad4bcc6f2e96cbde0c1e0963c95ba61b8cc38f7af7b05cd7cadd38feb
File Path: C:\Windows\System32\prnntfy.dll
MD5: 1aefd84496983398d6d631c3f232e6d6
SHA1: 14d93d776856909c52bde2953024623a516bf319
SHA256:1a0c54b016dd7b5301b3400fda2ad5d1e4bcb17d8dbe62745f38665f65d73e09
File Path: C:\Windows\System32\prntvpt.dll
MD5: 25f8ee7f05be9a319454d7365da797ff
SHA1: c251ac79512f6be89b80044206d241ba1391adef
SHA256:e49d673ff27376bba4b76e65f957e97301447bfd9f06d60e8f5b9c097e813dd2
File Path: C:\Windows\System32\profapi.dll
MD5: 15eef1264823c4adfbc9276f382224be
SHA1: a498e5209da9a9c1e5769fb9f687f0f4b5908c24
SHA256:0fbf670dee0b2cb4ec017f4f1afa74d771e57734006985f9ec4b0dc9940af148
File Path: C:\Windows\System32\profext.dll
MD5: 4839f514f65e1d13c1e407a8b1fca349
SHA1: 70369189734c3022ec8df3edd01d42a03763a235
SHA256:e9c58fbf72544dbcc5a2101ee3719fccf51f4c030d31eb8be1877b80de475077
File Path: C:\Windows\System32\profprov.dll
MD5: 5f3e22667bdbc6746f551cb196e00ab6
SHA1: 6680e17b8ca6c046011c893a91e0faa240918b06
SHA256:781a6652d6615a4595ebe8ccaa05ea3b0df9acab90c15029735d528cb50373f2
File Path: C:\Windows\System32\profsvc.dll
MD5: 897a25ea5252e97375aa6fa806c732ab
SHA1: 02dc0a400e49cbbe1a91b0d87d2c13ca57b99468
SHA256:bc72968e60cb71812a311bb95b785823996e39957c2e82afbeb323c3d28a0722
File Path: C:\Windows\System32\profsvcext.dll
MD5: 8610c12189ab7fccdeadb4aef7490179
SHA1: 7f2aeb772eb2e9667b2134a8f1af965ab9ff2c31
SHA256:c8dd737b3f18bae9187026e4ca212c6fd68071ec9ede05980e9020d50dd31000
File Path: C:\Windows\System32\propsys.dll
MD5: 0e57ad3078f3b255002a33d5160cda86
SHA1: b618bc9d1e23a0b05baec147f16ddb0e499df968
SHA256:831d824534c1b5e61f3f81e8c08db7e6477c1193c0e54932130c5ea9b56b9624
File Path: C:\Windows\System32\proquota.exe
MD5: 561deef8a446bb13dc7cb231143b6033
SHA1: 6e068ff1f65479152a85d261798543a30e517930
SHA256:d115dd59e9d03da574a72fbed524c2e235e140322f6a9e29dc87d32a848eef7e
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Provisioning\provcmdlets.dll
MD5: 99b0fbc8b123d1feab7a14f4024ad924
SHA1: 794d18d367923b77064d32b8723b5f62e6edb0a0
SHA256:676c23ccd8e2d72790d48781a47bee88433a3fd4a1c5d1e6bb14c26d106005a9
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Provisioning\provcommon.dll
MD5: 4ce8baa5759a8de391511e082ff5e4b9
SHA1: 3f926967783255b2b8dffc7ac5e422c808868a1a
SHA256:e375b1181cd373b3e9ecb698445a90e1f7866ecfa8235777ae3ba4a8f2d06e38
File Path: C:\Windows\System32\provcore.dll
MD5: 35b1d44a73b1e01bcd24b018a47f7d02
SHA1: ea1d8bfb815f0938bf2fa3302848d6b71333b03d
SHA256:d006761c715d5301da0e46d464382b0e07f8b425839f8aea21ee94042468e96d
File Path: C:\Windows\System32\provdatastore.dll
MD5: fd28c97762fe06830896ea5d5e7d8d0f
SHA1: 71d512dc966cd7c66099552178556031f4f6ee5b
SHA256:b343a3deea47e92e637512644b188b9314beccef2623a882bf0c512ad44f3e16
File Path: C:\Windows\System32\provdiagnostics.dll
MD5: 9fbcaa0b1c13ceb5182985bb11b8f864
SHA1: 6933881d7dfbb8be44dd6b47c23b42cee80297f7
SHA256:2843743f08ef94c5d3f065cceca534835359cc0990e2a6ac1632c117179b82b4
File Path: C:\Windows\System32\provengine.dll
MD5: cba7041f41ddbb649a349bbf06519887
SHA1: 27f567631baa7aedb4d2b321c85dca988f1c4d91
SHA256:67146c79fc21b144c39f8a771a14098b7d1a1480e046c1664b084c1ab56641ef
File Path: C:\Windows\System32\provhandlers.dll
MD5: 505b4a4a20c203f7141ac98271ec8539
SHA1: fe924593bc47954726c0d7669252b157eda56292
SHA256:ce455d17502869b5c2d1601ac8b638f5e39d9833db60fc022d094fe1ba384473
File Path: C:\Windows\System32\provisioningcommandscsp.dll
MD5: c7b796aa2134ac38bbffa4691125a245
SHA1: e0f95cea958205e68dbd781bf8162227c004ae32
SHA256:ce16b3cd9818b14620b57e8e7137f6e83d06aef10cfd15a7570fbc3984370b42
File Path: C:\Windows\System32\provisioningcsp.dll
MD5: 7a5177ae4fae482f10c847f0d09b446e
SHA1: 853bd440bf4ef739c39e9e21d47d89e6dcf0e7e0
SHA256:45c8914982238497cc4f6d1d41fb5ad070fd9fb4aa967e85a73e26922964440d
File Path: C:\Windows\System32\provlaunch.exe
MD5: c859317e712eb47eeda7d8041db5aa51
SHA1: 9b8a1e4d4dad61f0e21a4a18d8e318a147f73726
SHA256:25415a7004d9f7e502c8713e04c0441c22a3a409d6c7fb41bed4bff5e95fc448
File Path: C:\Windows\System32\provmigrate.dll
MD5: 1779a42f4973ab84049c0d8153cbbffa
SHA1: 83c160424b6518a9199a0199d8286b086c03097c
SHA256:e8f278cf38a09509ccf0b685183984a4d5af8f1b712e05074568d58e9fc4092a
File Path: C:\Windows\System32\provops.dll
MD5: 0a00c17bc9007b0eca7493632f6bccaf
SHA1: aefc6c38fed7ed18930cbb832a9112b7cff1fcaf
SHA256:41ae3ee830b0699c594e3d88d77e2e9726845d0f4e1563d9ec6b7e534d67adfc
Description:
"ProvPackageAPI.DYNLINK"
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Provisioning\provpackageapi.dll
MD5: 9175affd28fabdff2a817e7f865e4bad
SHA1: 8fb4acb478655e46e9209d65f7eb3355380aa018
SHA256:d8aa5671dc250e02e447ec62d6360c5bd743160079d9be49e3fe6fa425ac54d0
File Path: C:\Windows\System32\provpackageapidll.dll
MD5: 5191c0fd815a0d60790740339de44719
SHA1: c1982a28e1791bdf867838ff82ceebf8271780f9
SHA256:caa37e47d724aa43dd145a308ab32e64ca363debf3b4deffee675f2340c4c815
File Path: C:\Windows\System32\provplatformdesktop.dll
MD5: db184826ecfa03546e6a7a5676cc9fa3
SHA1: b3493ccfbfd5c23568e70161c8443bada0c39094
SHA256:ea0b9d50b12ae221c8f17f8f3e4127f6f954ce77bc1a7991481f8696fdd13692
File Path: C:\Windows\System32\provsvc.dll
MD5: a1a7b81f03f455cb772a04aeced657a7
SHA1: cfe8409c17b76781d42beaabc944367253a4f6ab
SHA256:a096a1a6dfa30782e0d8553b9c45c537c329610b2c845e43dc76f99e4a110993
File Path: C:\Windows\System32\provthrd.dll
MD5: fb444274833d6e97d35f34c9eca52ad0
SHA1: 9691fbfe47245911077f45c389ccc9cf0070402a
SHA256:6995774c4f464f6a5077ee33957920f539038c8acd501bb404c4ad1a8f78667e
File Path: C:\Windows\System32\provtool.exe
MD5: 0ec192da77fc5321ea4f23aa63e4e4ca
SHA1: 86c51d21a873489cb3005b5a53e261187fc4e680
SHA256:083504121d400709e7262c8e118e1d68b23c1b86bb12a93f4c733671c180c9bf
File Path: C:\Windows\System32\prproc.exe
MD5: 912400a90ca88e80abc6cb8f30c1bb41
SHA1: bf32f1dd03d9dfea828109824928c7f13b23ca99
SHA256:a174de17639a2c544d8124895f878abaaa634fdc63bf49979b407fd7a20c28bf
File Path: C:\Windows\System32\prvdmofcomp.dll
MD5: 9961a088fbc5ac11a58d84228e6ebbd6
SHA1: b90fdbfb5d525b7cb61d9f747e0dc66da437c023
SHA256:2cc4b53518767b0156fe20b16b5129150d81e294c49e419ce64475b0cd8d1610
File Path: C:\Windows\System32\psapi.dll
MD5: 4339eaeb2ac081e3c32a66ab8bd58c33
SHA1: 92d6e0e3bd3220db2d7dc9a40d5ea324634c30f4
SHA256:8c91fa7e5ee1de667d3cd312d8a40cfdef6db93738c8946f9bf5538d8a609f46
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\pse_op.signed.dll
MD5: ef2c7044d6115c2ed234f26ed05fdadc
SHA1: 113f92b47d2da5e01b15c76d8ef56c0a06d9dc13
SHA256:77fe59e23f902b4ef91dd228b0ea5ab24ab904c59e87a907aaa56b3a01783ec4
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_d372a4ea3b959b1c\pse_op.signed.dll
MD5: 8bf3c4291cfb768381cf6fb2266e0159
SHA1: 089e37cbf483c401d6ba139cb0127d1dae8b918b
SHA256:1505ea81045956f435dbde252ef370e421f4fa2b71b738c92866e0be4f6b2a49
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\pse_op.signed.dll
MD5: 23c94a58ed8d07e6430d89f859db38f3
SHA1: a11e900ad23656916c6e16da1031966afb67200f
SHA256:882de57105ea23e9c40c91083aa950062e112dc432679e7ff3df4116e676ebd1
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\pse_pr.signed.dll
MD5: d1b4f5d9c04ea63c07e5b6cf768996a2
SHA1: 2fe4d7173ecf4df9bb0057c3c6ca1c08df1844c8
SHA256:95d5ec5b607997b6f7952a9b6c27d77adfe07a87f30c758ae630a681249b9dfe
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_d372a4ea3b959b1c\pse_pr.signed.dll
MD5: b5ebe20680829fe0e530e9833264ee13
SHA1: 106d615dd087d19c531f6df2040322035513d474
SHA256:4e517677af389f61b37b710349d13d8bf3433a6f6242223352df5c0ce3a53b56
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\pse_pr.signed.dll
MD5: 73742ca9f5736215026fc4cafd995b9a
SHA1: 84552b4c6a88f3b37aa2407552b3e61aea23e2ac
SHA256:168c63b2466bf99f4b690790721e17207b258061b2a2b7ceffb2f623ae3f3dc0
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\pse_pr_2.signed.dll
MD5: 24a9fcf0f926cf2c48178c385d4ede1e
SHA1: b924cdd1fbaff652d7393989d2d09b6bea2cc09a
SHA256:d841a8aab8726a7a752b3bb06985e818f238774a64d3474af7b10423a1c5e7fb
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_d372a4ea3b959b1c\pse_pr_2.signed.dll
MD5: 923b03a87377e5e296104b53a558b7cb
SHA1: a4ac0a467874c89a172d96408b813b5ef525d66a
SHA256:e39c3294ed87280150e9a6066092ac4508fafc23b8c078159306e6b4172c7b90
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\pse_pr_2.signed.dll
MD5: e8a214cec642c80929a75bb77dc9ea1f
SHA1: 41bec7cd820c633734c1f733398026b1174c59c8
SHA256:cb042b407d5fc7a4ced16d5d04037687b7ae0ec29e9c67fb1c5eb9b0dc3da771
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\bundles\psepr_service_bundle.dll
MD5: 83f7e72066f46671e54fe2af01a766e2
SHA1: b3b5b80a15b1cf02b3bd8810246ee7aae69c469d
SHA256:630950387e715b7597bb9208d32bf4914eafba0abf25f4f534731551557840ef
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_d372a4ea3b959b1c\bundles\psepr_service_bundle.dll
MD5: bd4dbf4783ed0b0f34899ac8ed58b1cf
SHA1: 3f7b5d25928f0f4a35797da882da28ccf1a296ef
SHA256:aa9f040d5c97fe09d32238c778af67b691541d93476307bf927051a1000b8c28
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\bundles\psepr_service_bundle.dll
MD5: 060a516f299254ec82d593d2b0ec809a
SHA1: 2224be3184f7cadff04e3569de97835a178d92ce
SHA256:181a902bd016b25d7495df985ee072c93d90a4f118c4c78d598994d7000c3e72
File Path: C:\Windows\System32\psisdecd.dll
MD5: 440ff4b22c3493e40e26ea7c26a22e08
SHA1: 509f5a0057cb1e32eae2e954cefcf6a467181be9
SHA256:0b2a7c99469444d553b067ffa984e89b1bdf90fce040d0c714836dcb7d870c9e
File Path: C:\Windows\System32\psmsrv.dll
MD5: 22bbf2e81ce4313f1f573280fc8e7d40
SHA1: 1f4a836287fcb2559759652361b9902bf81f4056
SHA256:9f20be3de878d072e4e090ac9e06df7a216d21d7847474150b160e722c6665a3
Description:
pspluginwkr.dll
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\pspluginwkr.dll
MD5: 0bb0f55d6f3b11404ea88755caa92ac7
SHA1: dc1ecc10d10364569fa2c598204e5572dd2ff890
SHA256:da11e51b6867e233c9dab60cf0edd93410ec6c382acf853d0b79005d3735b03a
File Path: C:\Windows\System32\psr.exe
MD5: eeb735e47383bb98cdd795e1fd80cf57
SHA1: d854353bccdaf726f101b8f15954300e0408b77d
SHA256:dcada6cc107df24822206056cbff18f455e63ecd1ed80ec7bb957ba0e41ef1a8
File Path: C:\Windows\System32\pstask.dll
MD5: d2cdbfcf382759848b76a2ac3422b491
SHA1: edc3e444b5c046a47e58144977393a5b97b9158e
SHA256:be8040bd37a6868acb65672d94336ef62f831ca2100297744bcabadbc7f1d200
File Path: C:\Windows\System32\pstorec.dll
MD5: 7a68cdca2338fb226fbc61925791bce7
SHA1: b9eb5c2d6c1e67093c9c709064b50d5eebea640a
SHA256:fdf77e40fcebe6e1db2e6679ead423962c0359d24b9c91efbfe1bc8675d36392
File Path: C:\Windows\System32\ptpprov.dll
MD5: 7d0b11c66f2067025f6ac2c016977018
SHA1: dbda101702d78ef3b56e151408254d4c07e04399
SHA256:2e93c06d4dd1478de775e5b02c38cc17a0aaecd28c0d85a107b03265b2c788c4
File Path: C:\Windows\System32\puiapi.dll
MD5: 6f5b917e8e528f0f44d2ee1a719a1358
SHA1: b793259fb01f470024f384e05ef0fc32ccc4a8c1
SHA256:6cfede48da77ac9d6d57a09cc916884933d9689c43bae893dda21998bbd6d764
File Path: C:\Windows\System32\puiobj.dll
MD5: eb50c39893df5528356c8a48b97d46ed
SHA1: 842cad6993216b0d80a7752623781e8694e814b0
SHA256:d04d502f7afee39024d992550b589c0cc0a183a01e03e0c2859a97b958b23bda
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\pve.signed.dll
MD5: 1d243a8f2502da2c4360655c7707ac61
SHA1: ee17089ead669e6050757c2c4de4bacfee944488
SHA256:b2f3b83084a53cea4cbe8183c7ebbe0ee0be9dc16e7a60394aee55febd2aea40
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_d372a4ea3b959b1c\pve.signed.dll
MD5: 98e006543ffa03e4ab20daa58f9a038e
SHA1: 074588cb0d1d676f356cdafc83b641985e0b6106
SHA256:f5824f743c70b7469d614507239cd985cc893a4dd06b2a5facc537dcc3757adc
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\pve.signed.dll
MD5: a3864f7538f0efaab482b9190a839f81
SHA1: 038ae693f38dab86ace39c7b751ffc8f50f46bc9
SHA256:c48aeb9b8c3303622452cbaa6fbc26960ab1c1e170051467f921cfd60eef00f5
File Path: C:\Windows\System32\pwlauncher.dll
MD5: befbc418e8a7f666c9c11ff83762ce0d
SHA1: 7ab74f46b4600efea538190784fd9c7f086349a8
SHA256:4608da7748a18fa4a4e404b454d85a86f18836f96fdd3e24f28919ae7e1105aa
File Path: C:\Windows\System32\pwlauncher.exe
MD5: 0b80cf2d0b14393d604e1b3f45b533d3
SHA1: 5989c4f77687ab0d412c3b732e018e6b72d4ef94
SHA256:20bd575e31804c52d7edc3a6298aba504878d31df549d3fc82fe7a99ee9a966e
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\pwrshmsg.dll
MD5: 0d6bd63bba93bef25eca41cfc460af27
SHA1: 7c111ac3fd1fdc65c874a50b49dc57b2df368a00
SHA256:17b9002bd02d98929dd701fba5a1d654cd8e259ae6e82acfdc1db15c1b5dc062
File Path: C:\Windows\System32\pwrshplugin.dll
MD5: 4e6f1db90dfced466743efbdde9eb909
SHA1: dbfa73ab72e5593ba70b73a29c2e8aa1284fb759
SHA256:25e8d298caf10390ff1c97bd1ed7ed7d1d3659db4aa8fb8120d6b7fba3ce4dc9
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\pwrshsip.dll
MD5: ee43127d0ee549cd7c9949074080d1bc
SHA1: dfe1ffc5c286af132a51f6b413c2f58843ba2032
SHA256:31648c3363fecfdb61e14c2717ddc95220eaffabdda6173469e992ed36de095b
File Path: C:\Windows\System32\pwsso.dll
MD5: acf077173d677824b86103ae29d13cf9
SHA1: ac6be251b5b98e04c5dca8659fdcc4f262780634
SHA256:1d0ba4abdc4492f80c064a3b190a5da875450b7ffbcc36a716de620d8aa1ff0c
File Path: C:\Windows\System32\qappsrv.exe
MD5: 663eef6513881b3ab42db330b7c7068a
SHA1: 2d98697add27c7f0233e4b4dec38c98f74bb99fd
SHA256:7854bece46eca8917904d60666a856de11ca4896c6452d5af1a1b20f1626c971
File Path: C:\Windows\System32\qasf.dll
MD5: 4f0d92c3b377ea4df95790ff5b1d2e46
SHA1: 450ec1400b2425e00d97a45586f611b75f4d7a72
SHA256:636cdb1cbf9571841fe24788c9122b6f614fb3370648c92e0bf522254a98e09d
File Path: C:\Windows\System32\qcap.dll
MD5: c5b07f9f08ee3fd3eb660c9b81b33583
SHA1: 2cbc1eb0740ef231157cae1dfb960379bcc1512a
SHA256:795d68c1e1e7015d506f5df8e904d96a67cc8a7645212726c5ecba1e068779cd
File Path: C:\Windows\System32\qdv.dll
MD5: 1ddcde9a29eaa799219a21d4286a3e51
SHA1: 0001185c43fa6fcb145c3ebdf608093f3538143f
SHA256:6182c1fe3603fcb70ec3fe57780d486a9d10a567186a0503dc7c61773492a8cd
File Path: C:\Windows\System32\qdvd.dll
MD5: 7d9d2fd796e0c76c768d2178b8fa0ec5
SHA1: 9e36e92aa62ddd2894c3a5124a4968e144a44f8c
SHA256:bd83b84eac72f92c4ba6fa7a0d3e11d0e31c725c035116546b0434ec5bebc419
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\qe.signed.dll
MD5: 4ab2162bcc67ed703b49ba3de233449e
SHA1: 06a320523edaeadf78bc59b3880d87b41270d84b
SHA256:cf2a30e07a5036afeec03d279741c5abb972ede7fb704065c1b94f688cc41c4a
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_d372a4ea3b959b1c\qe.signed.dll
MD5: 56164ff08fbd9af8746fa765c0db6302
SHA1: fce55104e25dfcb16a6e17ec8d67b62d85cec807
SHA256:110282339d411687461d4f2950f5c07885f5aeee862f86b6c503e1a8cc196d7e
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\qe.signed.dll
MD5: 560b1b2ab9a53418e4e4e73d45ffd90f
SHA1: c5f526b9f2f47fe830e6b9d26a7de381b568951d
SHA256:8c561a0349bc770c3bfd349534c53e975ff7bca605e9d3ed7dbd23c29416d981
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\qe3.signed.dll
MD5: a5e3b92865d86743301dac3afba67fc3
SHA1: 9161c3cf5e74d4ccc8e5c69d7761ece6e9beace9
SHA256:449cfe5c975c434cee7034144acfe06fe8af05272724c89a38f0228395a6fe04
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\qe3.signed.dll
MD5: 3fbf524359785f74d13bd64faa7b1b5b
SHA1: 035284845d6d6a00d3da14b4515565b111c00458
SHA256:4925f6c3adc9c1e9e2277c5bd0cfb6d4b710729f1acddbf42a4d8e4515702552
File Path: C:\Windows\System32\qe3.signed.dll
MD5: 05f491020cd5a659a067eefe0b46b03c
SHA1: f50f6f7b7cec5828a2b61496c2ad865745a05e56
SHA256:372536afe95eb618a7d076bcc6a79e0c6a1c434f0323ed81068e84dfbc728de5
File Path: C:\Windows\System32\qedit.dll
MD5: 3ef7f5f3a581fae55a7b2412cad5d8bb
SHA1: 28240442a2cf99e7a016e26a1f7ec19e0e6a9e96
SHA256:8f8f564b5539f355e99d63c6ae756dad82be8330c8d2fb8860ac308e3d51b6be
File Path: C:\Windows\System32\qedwipes.dll
MD5: 9f49c93d4c440c08c765c546efbd329e
SHA1: c50e43625a3f972ea9b9e09a665ef463e2bcc738
SHA256:024aacd70eac2668754ce10a7a6d02bbffc5e32f0f5063c0435308d5f240dbf1
File Path: C:\Windows\System32\qmgr.dll
MD5: 151a0b1d6d5f72b62365573ec52dca2f
SHA1: 768f973bfde4468a1dbeadb4cd36a5bcd1042dfe
SHA256:5329d0e5a52d54b330236677931aee9a8081783c002d4bdfd24b7abcceb89842
File Path: C:\Windows\System32\wbem\qoswmi.dll
MD5: c555e09adb981678a35e0338d7c4bf29
SHA1: 9dcba2ae2be10f07738563bd5852b88f1b6a19b3
SHA256:c8ea31f8aeea4a8a4e556d15deae820ff1820b55dd6de6805bf1fa9e081c479f
File Path: C:\Windows\System32\qprocess.exe
MD5: 33305ba7125d811f716148c421553f79
SHA1: a90b92d3f21fe22bd7c896a0cae8663ad7514273
SHA256:f71965f45a393e95b8c10b6d8947903bd0f035fc8ca3982d0f1a7d42b23fa315
File Path: C:\Windows\System32\quartz.dll
MD5: 9118519084200cee54921f16155f4bdc
SHA1: 41dfea99c2623696ca031bec657b76bbcbfcf39c
SHA256:ede5ede0b8abc44f21b631a37f904e7c1589f692449b79493293305f83ad30ae
File Path: C:\Windows\System32\query.exe
MD5: 29043bc0b0f99eaff36cad35cbee8d45
SHA1: bff9633d301818eb5deb684e758a04bc204fecc9
SHA256:58d1132b636c6d33c2b8b3659f310f6de370a00f837226129657b2b82184a307
File Path: C:\Windows\System32\quickassist.exe
MD5: ace6a51fa250827d0e3f8cb4c53752f3
SHA1: e78a0959ba97824812f7fd93bfe5ff6e4288cbca
SHA256:d03567fcc6ca7a1e9d1673c58fbb580d020650c491d7c5b4c729f8bac7a830ff
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\bundles\quote_ex_service_bundle.dll
MD5: 72d816aacfb745190b1fe8acada52c75
SHA1: 9219596f57c1d4f377266b382334985a21d534a3
SHA256:1d88dfaa4d63ad3f85b5cc9e86f9d9238d61bc09c0bab5f582c8d10d65561dbe
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_d372a4ea3b959b1c\bundles\quote_ex_service_bundle.dll
MD5: 510191bf5a89f479f9cd8bac06cbeb03
SHA1: df9b953204cd1b77c4399136f3e6b5e22c0d82d9
SHA256:159877d9d28e22993770d117e240324b4e14f5c578c85f53a1de9560dc7cdfe8
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\bundles\quote_ex_service_bundle.dll
MD5: 861c04dad7cde49d0f91a34e1f72488b
SHA1: adaf252ac6819640b34cdbd485a53d0ddfddc4ab
SHA256:ef7d4fb044ed0e26522d80eb6f5f3a0fb1290bb2e6cbb78113c77a021b6e6da8
File Path: C:\Windows\System32\quser.exe
MD5: 480868aeba9c04ca04d641d5ed29937b
SHA1: d675361b748caf22a3c1c275ccff2d472245099c
SHA256:766c791edfa6eeeba0f99d6481bfe23bf59e6acb81a930b71f3aa33efbafe544
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\dcap\qve.signed.dll
MD5: 50ed9f72c288eb1ab7cf9c0aab04232a
SHA1: fd7eece5e2fa62d4e3b52a86236a1c3eef893563
SHA256:cac2c2e1a61341aa2a8a6ff1a6355bb53bce4330aad38b27aea6a74e3f39cdac
File Path: C:\Windows\System32\qve.signed.dll
MD5: 53268622ec28eec612a14147be32ea7c
SHA1: 25d75e68b8b2fea853a4a76c0d91cb10dc2c917b
SHA256:eab4cf58d709f849ded387c4931dd8df6c0ae83ec2c94a0bea3aaaa49e018257
File Path: C:\Windows\System32\qwave.dll
MD5: fa8c5230427fc21b5969e6817bd71a22
SHA1: 7eb19c5499a7d74bda804c4ab0fa22ec1c57b18d
SHA256:85d978cdbda32a964857f44ac1ec589ce2c54c1e3cd12a1ac366d388efb16a66
File Path: C:\Windows\System32\qwinsta.exe
MD5: 3ed9ccc06af18ef822e1794feaec6183
SHA1: 61bb46e5d659efe16e5c019eabca1aa1d5cd8f8f
SHA256:08ac265f1888731d6ff54d762fa08b06b172a9424b66ce113afcefef9759c37b
File Path: C:\Windows\System32\racpldlg.dll
MD5: 76da25bb1175523ae0f8797afff77828
SHA1: 2bdbe33b3e86ade37b4cbe0e44b625edd1c682c3
SHA256:599826539f8d97285de295a074513f8d974e6746e1760f1650b095d62139c685
File Path: C:\Windows\System32\radardt.dll
MD5: 662d440b4dc095d624aa2d093e9e7861
SHA1: 90292ce7b94fba5a8166eb2130df66eac3e5dfc0
SHA256:bd8425f42b093373fa24b98e5bfffd8e48de4ebada65b675c404b01df7fc7b0a
File Path: C:\Windows\System32\radarrs.dll
MD5: 7b4b9c6d25e8890917ba3b0f09d9ceeb
SHA1: b7f31fb8602f0452d77a87a98837426a31ffa113
SHA256:32efca415eb6c90d761dcb254efbdf3d6aae1f8b82cf381a3858fcc5751f8272
File Path: C:\Windows\System32\rasadhlp.dll
MD5: 339501f87253fc863acede45ee251f75
SHA1: c51a9ba91d05fc12f7cda33bdb160186d21d123c
SHA256:81a4eecae1d6be831a6a720fdab12095cc5ce009798b551de802252a44dad425
File Path: C:\Windows\System32\rasapi32.dll
MD5: 9658398ea2aae312a2899d69baca8731
SHA1: bacb41b6b11d0c31eb2dcfb50d21f7c2949c7483
SHA256:4bef55b77569b181e5d977c208c29b5a08e11dd47d59409538ed54a493225e3a
File Path: C:\Windows\System32\rasauto.dll
MD5: c7b995af3b099cb72c1e2b1fecc03255
SHA1: 4ecf909084f80d93cfafcf90788e874a0c627a11
SHA256:e2c24b35d73149421ea4c93f1bea992ccd97da3ea04cd36e955fa67af61ccf75
File Path: C:\Windows\System32\rasautou.exe
MD5: b430094b901c117d6a211950bdf2ffaa
SHA1: 918e5e6c4f5982b44f87b46d0305ef8d2fc3abb0
SHA256:4d45bb9b4e57532a91cdfcd731dce44460919a910aecddee778abba28c1a8215
File Path: C:\Windows\System32\raschap.dll
MD5: 2772e6c541c15eea731510eed5e7a6df
SHA1: 89f5ca4b7402bf88fc2482ed05a61ea966d54c3c
SHA256:dafddcf4837ad32c1dadc230c6930ad92031fc546b6abf2e64f535f4712a91c5
File Path: C:\Windows\System32\raschapext.dll
MD5: 12f14f7dca0641ac449ecd6f20d363b9
SHA1: c8c8c1c2fb2bf598b4970a4ccc2f40b89bc761f5
SHA256:3d63c397591bd6938b3dd4c6c7a1bc26db49f20c504c9c217e6bfae4bcc0a62c
File Path: C:\Windows\System32\rasctrs.dll
MD5: d8bce79b48ba4c31314a0a790c239458
SHA1: d5eec2451773a66db05e1e9f2275658dc71d3dbd
SHA256:48298758dea25bd4cf1b943f65644c96327e963f6b21bc1ba9c8115f81f0b74d
File Path: C:\Windows\System32\rascustom.dll
MD5: fb3f02b2a88e586b1855edd2c4589c7c
SHA1: 75cbdc38dd623063392e9810ed8d5054e19c2f1f
SHA256:5a352a0597d81dec213563f5693daac8fe4d178c679b2f93e0d914b9bea2283e
File Path: C:\Windows\System32\rasdiag.dll
MD5: 7b4d70e3d2662924ee471fe497cd4f55
SHA1: 9cb7aff3f70cef81a57ad77aee70c89be5c26e25
SHA256:a4fc87590ba205e9508cc4f2b5f0a458b64b0550148b1833416258bfe0bc9a36
File Path: C:\Windows\System32\rasdial.exe
MD5: a3df4b06ce76229f1aa6b5165c55e972
SHA1: 4107d43f3c3e4ed360f12595235db537aa5fcb30
SHA256:91f23b70c0b0237693948d7cafe752b1d472df4b05485c0c533f08dfd8cff2e9
File Path: C:\Windows\System32\rasdlg.dll
MD5: f8c0c3ad414033331710d117c817e7f5
SHA1: 3faed8ca6b7d1b5744fe887ed413ec14b1ad8182
SHA256:fa1e39af8485b64ab8a69df4643f2663f9c6b7fa15b77cc34984cc9fd0758458
File Path: C:\Windows\System32\raserver.exe
MD5: 06ae006dbc22db34f13598be5e21e662
SHA1: 49281e8669188e7c0631ef61a07ba765efe63deb
SHA256:360ea04d7985f61c7c20c6ee1ca1e4d53c42593ff6d5ea2a1ddbc7a155b221a9
File Path: C:\Windows\System32\rasgcw.dll
MD5: c95f1146ed5f00516c6e45f21d05f3aa
SHA1: 8d5b2c5f600b23ab6ca65c043160f8b7fa71a3eb
SHA256:44b01fd87212590d1ea01005483e673bb746de574e8b80544894aae95b330624
File Path: C:\Windows\System32\rasman.dll
MD5: 6df3810fc4af24c2a509a331243b0782
SHA1: 83151e3b10daa524cb64ee5f3ddbd9e51cd578e1
SHA256:7900cfd75bb349b57e8d74d6d1faa15d2cd764840125cb2d68a2422640697647
File Path: C:\Windows\System32\rasmans.dll
MD5: 86edc81f46b5b44511ae0e5e57ef58dd
SHA1: bf78fff0cb3753b6e25046ff2db995b2ee48b5df
SHA256:b80751b12ad65f533b3f6dfa5f3c8528e8055d035c2e9b2893f4e937d71d27aa
File Path: C:\Windows\System32\rasmbmgr.dll
MD5: 9505525550513cc12baa281b816505bd
SHA1: 298ff6056a2a6554f639684240985191c37883ca
SHA256:85a14c91487e8b1bcca505d3136d5eaf2b47fac17af6088e0ae520dc61ea021a
File Path: C:\Windows\System32\rasmontr.dll
MD5: 6f6dfd49926dbb7935e1ec5b59f4e5e4
SHA1: 4e6c414dab49f638aa4c964e1ea58cb8edcd3f54
SHA256:9e99681abd71a4409a15dca8f6dd69a429bb7367088f133b4f80d96b21c03665
File Path: C:\Windows\System32\rasphone.exe
MD5: 95356a41f7c4372f45fcbe4d32bb2003
SHA1: b1d877340c4dd4b4fa03f87f13b9d2eef976f34d
SHA256:f0b3457eefb179af919f3ef4014655e17a6ce49065504f0b4e48d9ec0cdf6e64
File Path: C:\Windows\System32\rasplap.dll
MD5: 777891e96eb76261fbd6371e871dbe22
SHA1: 00dfbde673fb93d7222b0914ded924b1c1f1c26c
SHA256:3e678aa29e0a28353dce4e6320a382d1301c5a11b885334f6fcae6b2cf9a126b
File Path: C:\Windows\System32\rasppp.dll
MD5: f91c6f8d88e3fd1b96ed84d35222f239
SHA1: 8abeb730442721ce3a1a613893466668e9d090c9
SHA256:282839505b43742f2017e0547b0befdef1811042687c13fdc3cfba1c940cbd5e
File Path: C:\Windows\System32\rastapi.dll
MD5: 984dd148acfdba8b480859c06aef220e
SHA1: a9c9d129123aa8113e38dbcf6beeca5ad606cc85
SHA256:0488f086508091922b45b8e1269024e77385d7f7d10faa6adc6f9d61d8202775
File Path: C:\Windows\System32\rastls.dll
MD5: 3baaa86a07a0c50f55cc1e9388f9376f
SHA1: 02940148f6e9e6bdd2240bbca33249b34368fe22
SHA256:e4069f47c901ea27356ee2954a123b8ad024fc8df8972267b45f4cd94acb4311
File Path: C:\Windows\System32\rastlsext.dll
MD5: 626ba8f4cb9f2819c103096cc4566170
SHA1: 5e150897c858a7a7a6ff9e8198cf721b08fc1d60
SHA256:5f0d8a1a6e68bf7a96e3c86af7826a14c9964f1c04b73c0d5095c23c2d85edba
File Path: C:\Windows\System32\rdbui.dll
MD5: 94c44ebe808104532f32b7eb95fff7ab
SHA1: 5b75d6be3fa75588446fb2baa4099b8ca63bc017
SHA256:391e84570831c75d134b7beed3163bf2ad5c4d93f15435fbe52e6f25513a94a3
File Path: C:\Windows\System32\rdp4vs.dll
MD5: c34b2495e929aaf9a584923de4bf9c79
SHA1: fea6b422e100310e3a732726c007b333e5e41f47
SHA256:4a387ada622376e0fa40ec3161a9176cc3ebbeb08d24e5b78c78036db4e66807
File Path: C:\Windows\System32\rdpbase.dll
MD5: 7e4f9e617f4cff7b67a879e08cd3b9fc
SHA1: dd5d8d76a6e6f098455a6d6371771782956fb95f
SHA256:15114a1ca11ac55ea2afade44e5dae6f051f708a9d3db30184501552d3ec308a
File Path: C:\Windows\System32\rdpcfgex.dll
MD5: 509f4ec6462480ab8289824418b2bd76
SHA1: 1e2a4e39eadd7efa6ae39ed9e9a8cc372d2cfde7
SHA256:7e335afb198b0708b2c44011e2cc6e131fb23f2c865fb58cf0c58af4a3903e58
File Path: C:\Windows\System32\rdpclip.exe
MD5: f3fe4f91344ef202a1695516c66871dc
SHA1: a5423d97bb23a6eda88429f616524fee2bde55cc
SHA256:1415bcf53ce0103601a6b217e00458a132afb6ebaf1260dabc3318f34f560eee
File Path: C:\Windows\System32\rdpcore.dll
MD5: 6d43bcb9499f7b29f2a5dca85fb7986f
SHA1: 6d68fa6762767bf9376f5067a06dff388c2ac5b0
SHA256:3f3377d43755528d847035d804d677513f95fd66d69021c0a721d67c9204d745
File Path: C:\Windows\System32\rdpcorets.dll
MD5: aa317b946dc0c225e46a55cbe2bde328
SHA1: ca4c9835ed77ad9077f5ea4c99ff374f0480c40b
SHA256:247010b6ad64c1529e08dab892b6f0639f039cbd2ebc4b360370fa1cfe2f6d65
File Path: C:\Windows\System32\rdpcredentialprovider.dll
MD5: 6170e675905714547154ce44135d0a46
SHA1: 9f61251efc3f1dfacd59f268377d61a56b4d47d2
SHA256:d9b7426314f75d36d4a06e1f8a66f4652f4b4bb196a54a2f982c85fcfc5e5dd1
File Path: C:\Windows\System32\rdpencom.dll
MD5: 906bd843474ab86e70824cc32df019da
SHA1: 0ecc450cf0e5085eac6c9f6fc7c89d8776f83fdd
SHA256:808533e880fc524dc1236732ffc8811cb2e900eda30f4ab99f5e1a79fed28f33
File Path: C:\Windows\System32\rdpendp.dll
MD5: fa816017384e9c509a9dc12759d79e32
SHA1: ec727762e3676b497c12044df5ebac882c1dd0f6
SHA256:b81663a3f3e2a4942c15a66da4c7da76cadd765f8ba5060a9085afe058561c7c
File Path: C:\Windows\System32\rdpinit.exe
MD5: b4135c8787cbf2da0f6088bea8d26cf9
SHA1: d7028f51c8373b51b50be23b7d4b5ab874f9c902
SHA256:4192e211576f6763072122fc2e3efb8a8f49ed9edb9ba44a9dad46ac2d7dd7bf
File Path: C:\Windows\System32\rdpinput.exe
MD5: bd99eeca92869f9a3084d689f335c734
SHA1: a2839f6038ea50a4456cd5c2a3ea003e7b77688c
SHA256:39bfb2214efeed47f4f5e50e6dff05541e29caeb27966520bdadd52c3d5e7143
File Path: C:\Windows\System32\rdpnano.dll
MD5: 7852d37790807e55bd71a65183e0f1ed
SHA1: 587dccc59adeb490fdb8e58dae4e6a917db784e6
SHA256:458b24256d04c9f357f2534c7a0d611fbc9174913910b83907f70b32ea8f1d65
File Path: C:\Windows\System32\rdpserverbase.dll
MD5: 4c4e09856565040d0fc45d950a18e5f5
SHA1: 2a2cd9010b8196a2644d425095c10e9f55a4a464
SHA256:48c49964fc09b8f3a258a4e9a1aa7c4d7d7ccb55b496ed001b788c3e44f5e600
File Path: C:\Windows\System32\rdpsharercom.dll
MD5: 3009022a3bb38b4971926fd5ec586c7b
SHA1: ce1e9fd716318e1436ebfb5a74b2feb6b9bc6b7d
SHA256:89cfdc33c025c0877b19464d3c068200f424a2c5c8c7d5a77f555885a9eeeea5
File Path: C:\Windows\System32\rdpshell.exe
MD5: 0332208bb654350c27ce437d232d0726
SHA1: d694ab2f2bd93f702ae77bf680f05c6a1fbe2cea
SHA256:7b990bf8573e1bc31a4f8187e3bd9c3e8c6b2409e05e11f633e3506353f81abf
File Path: C:\Windows\System32\rdpsign.exe
MD5: d48028964f7c8578f51ea54b6cb82f0f
SHA1: 938a2070bbb45ef9476c9890c3a7986116e1dda1
SHA256:301201d452e91b23a6f8c5959873e89419268a29ccd06a418b814ae419b8e978
File Path: C:\Windows\System32\rdpudd.dll
MD5: 356a2044cae50fa5ec6df2471f29a7ae
SHA1: 1df5c48fc2660c64ae65f1c27b65c61e016c80ec
SHA256:4bf6d0352fedd4c06d6831819cb0f8e4c0735f0d96a9245fa44381209d81e2c4
File Path: C:\Windows\System32\rdpviewerax.dll
MD5: 6769aebe95cf05fa453616db05294783
SHA1: 952d5383897f2c021de61c206f29293efa70b95b
SHA256:515c54c23cf55d1fd7bb5009199fd7993c9ef6d315feabb5be543402af4d944a
File Path: C:\Windows\System32\rdrleakdiag.exe
MD5: c04f4fb2c7b44e19e85908459d3f0085
SHA1: 5352e3c56e4ab1c017cc4571423b3ec9c2629b39
SHA256:d66e1ee7970598a5f34fd4b468b5b7705219e80a8a2784e7b18564831fca797c
File Path: C:\Windows\System32\rdsdwmdr.dll
MD5: f322f151b055b386175b5455350f65f8
SHA1: d5c1f9478eaee633039becf76719d1a62c4ca869
SHA256:309cc753da44595056504393774040eac5d171c0c8d8de1e9f9d7d4c2f7e8c22
File Path: C:\Windows\System32\rdsxvmaudio.dll
MD5: e2aa5fafb56cc28f1b1248c2563bf80e
SHA1: 17cde69ea7e777793b48b1fcd762e03fbbdf7887
SHA256:962bffede7d4a6d564b8e3ff4cb02f4a31f431dfaff55a51333d1ca83b53b2d6
File Path: C:\Windows\System32\DriverStore\FileRepository\rdvgwddmdx11.inf_amd64_e13e2b9679795ab8\rdvgocl64.dll
MD5: 4d0bcd8ef6d54c9526f4bc05f3b8edcc
SHA1: 4f5363174097ff561a2b148d572897b0f528bd46
SHA256:917064fefcf885fc4b124c53b499f50a8afac515a7cedbb3a0972438fd93ac97
File Path: C:\Windows\System32\DriverStore\FileRepository\rdvgwddmdx11.inf_amd64_e13e2b9679795ab8\rdvgogl64.dll
MD5: 5c2990eb093a3b469b44f85029449cf3
SHA1: f83fa257ac4d32259601ce07db619027a75b9bf0
SHA256:a4067b1271a076d46e4885cdfe25a61c3952822840104274738892f543f509c0
File Path: C:\Windows\System32\DriverStore\FileRepository\rdvgwddmdx11.inf_amd64_e13e2b9679795ab8\rdvgu1164.dll
MD5: b90e19587b7a3037793eaac21042e7d0
SHA1: 51299811bdb3a72f2b49b1783e2f0fe65247b610
SHA256:4d7480641c9b70915a793419c4594fce828ca8e1e63ecd35205a815a9f505cb9
File Path: C:\Windows\System32\DriverStore\FileRepository\rdvgwddmdx11.inf_amd64_e13e2b9679795ab8\rdvgumd64.dll
MD5: 6c331eebd19f40ff657de9be4e52d3c6
SHA1: ebe92eb61f1ec39e5eaaf3b86ce26a68e264aa2d
SHA256:c827330718da00ad44022a1760b4606c363c8f4409657df8c439f73aaa31a879
File Path: C:\Windows\System32\rdvvmtransport.dll
MD5: 5f07426010f774b4523a9d0f1cf0a05c
SHA1: f750e5d4a54415cff280a735004af796560a413b
SHA256:11d76906268a6c86bdc5166bad48417d7e5feca68f2599fffd135fb852b0070c
File Path: C:\Windows\System32\readCloudDataSettings.exe
MD5: 110cd3ed31e307ea27226f378bfd3990
SHA1: b508429005f90a7970abaca34d92d0e94d70b18e
SHA256:d2a6b713c15a44337e9b9ebd5d02a5bd415d9174fc5958efb51e99270bb89001
File Path: C:\Windows\System32\recdisc.exe
MD5: 37450a5d48a8b77a27c9e32eeddf4195
SHA1: 91a21260274a694d561f181e996c2daebe398239
SHA256:cd8a7d0aec85fa5b12e649318f1f4cfdc71b4b8d70d972c11a384a1481c4f0ca
File Path: C:\Windows\System32\recover.exe
MD5: fb2c06116ca9506829f08b8caae56561
SHA1: bb6745bdde365bcf26fca0727ff0541c3d173bdd
SHA256:dd8bc56ffb5b471b94f101c385439159b289bb9255a48edd1f0c247f5101fdd7
File Path: C:\Windows\System32\recovery.dll
MD5: 0dbca9b4405d5237528ca97e5a2aede7
SHA1: b38bf8ec2d92b9f4af13c826cee0c9d0183ecfb2
SHA256:d71a4f5332384e53f356ed552b68a669899a3dbeefe8b45f057d8c72adae063d
File Path: C:\Windows\System32\refsutil.exe
MD5: 6a83a203efa6e86591be170854868ae2
SHA1: 09a7ee3f9dca54b213eee6ccb63ab2fb08d6bd6e
SHA256:540a51ef4d7a71f56f78321ddd33941f6cb7f9900fa7ef45ca0b2942ca825f75
File Path: C:\Windows\System32\reg.exe
MD5: 227f63e1d9008b36bdbcc4b397780be4
SHA1: c0db341defa8ef40c03ed769a9001d600e0f4dae
SHA256:c0e25b1f9b22de445298c1e96ddfcead265ca030fa6626f61a4a4786cc4a3b7d
File Path: C:\Windows\System32\regapi.dll
MD5: 2eee41551bde9aea36d2f90f2aa515d4
SHA1: 32a5ef6a87d7931bee5c537f400b69e6799e009b
SHA256:e023450c912de9af27e2e0027017962bd21488cd4d2086e0a43787b3072f3af1
File Path: C:\Windows\System32\regedt32.exe
MD5: c6b24486de73a457d582f6beeaabc983
SHA1: b876b5c799226f6d6dbc4348b161de8f457ea968
SHA256:a83d55c6f3fd0e634d4cd570ced654a8bdc1776027680bc3f003476e764cc499
File Path: C:\Windows\System32\regidle.dll
MD5: 4f6bb67eb53123e892e9d17ad90f9412
SHA1: 8b5dff8a4d66c5fab60e06bd471a5dd1488c44a2
SHA256:8bfc70a6fe846ac415cf0d5920917465cdd97c964b6177605b20e13c760ac9c8
File Path: C:\Windows\System32\regini.exe
MD5: 3c91c37ce39ef6c3e6776b286ef7c295
SHA1: 2179c42587a2c140eff254d9c18131783c7acd34
SHA256:c2ee2ffe2fae173188c3568c47c8090347e6cb09085c249936df2d52c0521dbb
File Path: C:\Windows\System32\regsvc.dll
MD5: a21d0b003992276d272ee5013feed7de
SHA1: e3638e98fb234f912bedb16b84a72e1b8c667e20
SHA256:031223083cadef7b0a63ba1d4ba3d0e8b540e016e5e7b5050326227c0b4aa598
File Path: C:\Windows\System32\regsvr32.exe
MD5: b0c2fa35d14a9fad919e99d9d75e1b9e
SHA1: 8d7c2fd354363daee63e8f591ec52fa5d0e23f6f
SHA256:022cb167a29a32dae848be91aef721c74f1975af151807dafcc5ed832db246b7
File Path: C:\Windows\System32\reguwpapi.dll
MD5: ae62d02aceb32a4a34dd8c6ff010cf59
SHA1: 1798ea26c14215b94f87d59cf80fc117ebb5863f
SHA256:dc82ce6eaa1dc356387424d5a12780fa8263144b12a5e55c6cab91c01c707351
File Path: C:\Windows\System32\rekeywiz.exe
MD5: 1ced814a41ac0c1b5c792490ec0496df
SHA1: b08dab80afe3951030caf1db51463a724daac695
SHA256:f7fba8dfb8002ef42e95dca392f16b449aa22bb537362deaa8aecb4cc4ac6300
File Path: C:\Windows\System32\relog.exe
MD5: 96148f55784bf231189ecd4e4da2a52d
SHA1: ae3174e63da777c37778f0fccc1cf55e7c5860b7
SHA256:95ab6744e964cac9094eb18996537bc20ddc56a97caabc85ca411e890404c991
File Path: C:\Windows\System32\remoteaudioendpoint.dll
MD5: 3452d7a8e4256b698e2d5b58428a9a95
SHA1: a9fab8a33f3438c20f4dcc540af9efbc269c4f92
SHA256:b9ea0ab8a8f32c859e5f30739b727dc048f5cf2ac00f01016467848657c21085
File Path: C:\Windows\System32\remotepg.dll
MD5: db8edddd9d96fa71b86d189ce269cbeb
SHA1: edbf091dcedcbacb615fe98dc78dd70b30a2c3da
SHA256:8ba71f5f4c97b31a0c3a7e5d089621f4d605c5d46f840d7b7f5956abb1a983a8
File Path: C:\Windows\System32\repair-bde.exe
MD5: 9fa5c71841fde30c7d62cc95e5389e6a
SHA1: b00760877633fb4a34fce53c1c5142f2ffd43284
SHA256:13930144928b4c55ac75120678f3c523b6e6e1730b0e5bc972a15faeae399259
File Path: C:\Windows\System32\wbem\repdrvfs.dll
MD5: c481805e5e045b4a3afcaf73293019e5
SHA1: af6c406d83e6c64752c3a6d7463768ca8e0c62ba
SHA256:4fc1d8208d714dddc246131e6bea0d6d62f76a236892de7ea01e8c89dc5be1ce
File Path: C:\Windows\System32\replace.exe
MD5: 15641adc3ade668d89b40ccb6e2e9fe4
SHA1: fcde16b031b94bc45d01ea5ee54a550a4c96d7fe
SHA256:706b933384926b1fa50b959953fcdf43190c63b7232ae80e4116fff314df977d
File Path: C:\Windows\System32\reset.exe
MD5: fe84bb8bbaa4fa1fd3892be328e78a3f
SHA1: c4461abc06352b344acbb045e8bdb955a7bcf85e
SHA256:0f45ee243cdc2aaec85dc18b686a86b18d3416729751f273fc094da0a5bccf07
File Path: C:\Windows\System32\reseteng.dll
MD5: 26bcbe6b8a0f349f1605c8665ce01a4b
SHA1: 250db7c224dce3394a648060eba29596b164861e
SHA256:1ed898c0d7de63140c809b1f4195ada4eeb7c3db78a9b91105bfecebc64eec9c
File Path: C:\Windows\System32\resmon.exe
MD5: 852aca89972551b00b110eee6ada717a
SHA1: e1db406505ec0492825e83d81c9c0274c1acf1ad
SHA256:4c0bdf906af0c1fdbc9fa61bf2af95c708498f5afe8e05c65e865e99deac8716
File Path: C:\Windows\System32\resutils.dll
MD5: c1d61787469e67f4b17d4bf4a003ab57
SHA1: e07d99909696904cf8132ba4d820c44bf9ad367a
SHA256:dabb1fef3075981d33b63bc125f1da568b30988dfb74453cd84e7c44fbd9c5c6
File Path: C:\Windows\System32\rgb9rast.dll
MD5: 5c1227594207775abd0fc654e913fae1
SHA1: 3af0d6b681e9426d2e95e5b75ef4468ec36ea5fa
SHA256:3b45cad4a0048596db1ae3c958341f7c8688609f5ca34be6c11de589c00364c3
File Path: C:\Windows\System32\riched20.dll
MD5: 1784500a959adcea288b845eccfd7532
SHA1: 54e378552ab0a2626b2435bc1be831913516a851
SHA256:4aa8d583491061ab27019ac1958378462bf952affb747fe90ecefd8ebec21d2f
File Path: C:\Windows\System32\riched32.dll
MD5: 39d8572666f8786f53d32c8436ce6b99
SHA1: 08694e75d681b158755b4889909071cf634dc82f
SHA256:b50dcd7095a3b62415fb6c876804a1611ad94a11fc489d298479818e425a8ad0
File Path: C:\Windows\System32\rilproxy.dll
MD5: 70e5e88231068a5053aeaa4e1d952f9f
SHA1: b1be0d3ec94d1f993b6d19d68f90c387cb026799
SHA256:8fbf5ecb938268d5df468d723bff8ff9ec6a17fbee04c8847e889a027190a2f9
File Path: C:\Windows\System32\rmclient.dll
MD5: d2a1b6d2e42ec913dabde7a694522055
SHA1: a8a87d7f304503874759f46672587062a010353f
SHA256:22bba7e03ec03500c1a80d78609be131a314b4fe51b86d3eaa3adc00d6f1c95f
File Path: C:\Windows\System32\rmttpmvscmgrsvr.exe
MD5: 49a804412c0c4a270de72d9372aae2e8
SHA1: 064651dd858909c2e51957d8bcda172f612a7328
SHA256:b655672d54000d552a8881b86481d6af945bdad8433d3fc4d24ba7cfda383335
File Path: C:\Windows\System32\rnr20.dll
MD5: b7ee4ea3a902f9d6b45c3daa17952555
SHA1: 8a4041ec653ddadab1abd01a8668e07f5e1f35e5
SHA256:84e206b915f5bf1cb79a336b659b7550373ac621a1ee0f9e20d8b074d024f5e6
File Path: C:\Windows\System32\rometadata.dll
MD5: f0699f2f94ba593b9507b627fe2b6af7
SHA1: dfeb0288804cd34812756ecde51ca3f4e26930ab
SHA256:0455a236233fd1c285fde9a6b1e5e1c9c3d81981948a3d4c006fa6c8e89728fb
File Path: C:\Windows\System32\rpchttp.dll
MD5: faef423a5f8786963618da4ecce714c7
SHA1: 595cec27e605142bf75b8762bf4a31b5fd0545c0
SHA256:66161da7587c20f9a370597b3df72f684bb3cfb456ae1abe6ed9c4ec1b41ad0a
File Path: C:\Windows\System32\rpcnsh.dll
MD5: c5adbe46703a1db31a0c6ab7245f2da6
SHA1: 4cc8c03ed4b9ffc2566815954771f782b922b651
SHA256:bff0b93f9071a867d514d6de196e1368f655bcf54d4fc1623ee043cdb1cdbd77
File Path: C:\Windows\System32\rpcrt4.dll
MD5: aed18cb654be822c9075b8dda0b03fa3
SHA1: 5bcc2703e78920e211cc3303b6bad6d3b2257e2b
SHA256:1f8496f533572dce66edbd1be23d9b480cf9bbf719b43aec1a1461ed16b59c4b
File Path: C:\Windows\System32\rpcss.dll
MD5: 68034f1cf2e86e3666b6eca2ff2847fc
SHA1: d50e373f8ea0f9ef1b308e10b668ac177cb4b0b8
SHA256:62691691942967944011480c3eb5b151c61ea9e4df06ca3f35ae57e08b95f254
File Path: C:\Windows\System32\rrinstaller.exe
MD5: e5face634ea569edcdce0ff46de443c7
SHA1: f6ba7b10a20c815f4e2fd32b7b8da80a26f34b4e
SHA256:162c88d66c0de35f6d3fcd02084459f9d4a6e08d89bdda8d1801955a4cd48a70
File Path: C:\Windows\System32\rsaenh.dll
MD5: 1d0f6a30d716b5ab031df16faf13202d
SHA1: a5b361339b45bcdeee5cb73bef48462a599032e8
SHA256:a5ad16c3d3e7949dfb1d0092834fb3bdce215ab3e479a502130c47706f7d44f5
File Path: C:\Windows\System32\rshx32.dll
MD5: 8660b44706bbc60fa1c5628ee29010d8
SHA1: d720ccfccd92d234aca09ed725100c4dd9850445
SHA256:6a5d0e25efe18453ff1bce6f057d2b1a05b249272d8b42feb41086fb4fb6aeef
File Path: C:\Windows\System32\rstrui.exe
MD5: 9738d3b78e4c5ba0318d1836ac1742ce
SHA1: c965821ffffb084e5338748cb217da0375be6254
SHA256:5b3e453aa0a3b4ca160b206c2218e196b89c6367d9162874dc38356072cbea9f
File Path: C:\Windows\System32\rtffilt.dll
MD5: 67a4bc333a5b3c0c286e9c715bc4ea21
SHA1: c08a226a40d782cec672a76315e38e642a12c62d
SHA256:21df2820129fb67f2645685e11e4af490312b09228913f51da5c6485ba49d4c8
File Path: C:\Windows\System32\rtm.dll
MD5: 66ec43dafdd0a540e6beb33304286bfe
SHA1: a4dd4feeb3fb586b2aa3047223cfb455380dbae7
SHA256:07a4da532a3e2d928f08f3de163fdb19ed78ba94f0f790b483d2e19a222b3591
File Path: C:\Windows\System32\rtmcodecs.dll
MD5: 7b2fb7f1efb8fe97afca278f5c78ee92
SHA1: 3f49d0226377bfc40f2850f7f79785e2955536fa
SHA256:9bf0706ae55b5d392042dd364e21c56ea6922036741988c9b4ecb621e2a90844
File Path: C:\Windows\System32\rtmmvrortc.dll
MD5: e571e9f0a58fd600a8c5cc99fde770d5
SHA1: 9b3d6a66b2831d07c48f78d2cdec5f42b03ba987
SHA256:82de07c8d1fc2231aca4eb6539295a5c55c4adcc76bd4392a38a08177a9cbd27
File Path: C:\Windows\System32\rtmpal.dll
MD5: a4a53a5fc5b96dc1dc29962b84bd7775
SHA1: 5eac9f735b426f81d970a525fd951f0542bfccf8
SHA256:52fbbadb32837b7c92577e569108073034e16b900cd2266a7e2087dcecece633
File Path: C:\Windows\System32\rtmpltfm.dll
MD5: cc2c487d1949966ac0aa38f6f017afc7
SHA1: fb36e2b1a0dad185f126e1e0d64c160c0de6c4b1
SHA256:4a0a4593e1f67d56fb0d3e76870d59857976fc30d1f6bd9bd2e9deb08ed1d955
File Path: C:\Windows\System32\rtutils.dll
MD5: 55795569e44831bbc6af638e32327702
SHA1: 3995afa572ea74f0fc50d55d7fe59c1218eeb384
SHA256:348f04c6e8c83e952e9df839933f4bb48c3841962b9a947f5a4a36c00a6b8422
File Path: C:\Windows\System32\runas.exe
MD5: fe2b85d19b0c36e51229145bf483d6e9
SHA1: 33d95a2640b07f905d6be7cf05069e5fc848b3e9
SHA256:0867cc5937ab24d4cb334c1ef66a43d061923c856c64e585b15c3c9833ecba0e
File Path: C:\Windows\System32\rundll32.exe
MD5: 0b215aa244cf4708e67045e876c8bec4
SHA1: 916af368f8911b788371212a6c33d82d7cec6cea
SHA256:80ac7368205eec370f115ab891e5aab7c57a2929fd6d723125ea3ae0942dafc9
File Path: C:\Windows\System32\runexehelper.exe
MD5: 19b6ef1cbe4dd3419e97052eacacec77
SHA1: 638dcb224a3da38124e704dd9ca149c4fe8a904f
SHA256:62a0911af8cfe5ca3f7aea8979cdde4cea3a9225ef57146148da1576efcddb0f
File Path: C:\Windows\System32\runonce.exe
MD5: bc4e0437b1d60f3cc765849228e42964
SHA1: 77d76cead126f3e77b5397ef91817519722f9c79
SHA256:eb40639c488a46f8b787ab4ebc7a4f712286971432f1e8675e993dcc4c778554
File Path: C:\Windows\System32\rwinsta.exe
MD5: 690a9f472f6aafba0e90bedab91366c2
SHA1: 8f4e4a8634d704fd98d6df491149cdb472ba30ab
SHA256:44b1c84811495b426ec69a15888d5824a894421df052cc378fd6ada5c32a112f
File Path: C:\Windows\System32\samcli.dll
MD5: 88fc8a7c285558b7f502f1a4c7f66314
SHA1: 6ccceff830bf6683a4c20e64654fd05a12f40406
SHA256:09a086e2575c72f0835b7df861f219ad58b80f3a6318d44be29f4fde36a57f3c
File Path: C:\Windows\System32\samlib.dll
MD5: fd26fd71c10175584d40bfe05cacb6da
SHA1: 99a3619763158b4d08599a8b95974871f7585197
SHA256:d2e38985c92c17b6b84c21f9b45f315dc58ceb2653dcacbb7864d360822af7e8
File Path: C:\Windows\System32\samsrv.dll
MD5: 16d23b78b4fb852a5f5825b557682e6e
SHA1: 17efe46eb3fcedb55d54496d682045bb1151e229
SHA256:876f067ad50aabdd07ec5706b3ecc3a7c0f7d434964d881cafb30baa0f9aae9a
File Path: C:\Windows\System32\Speech\Common\sapi.dll
MD5: 8e5f7d99256f83879e605def219ac98c
SHA1: db0470d347fdda481243606a64984718e9ab8876
SHA256:d8e00d7185bc7e2760e6aaa612d90f0fb720397e3e8b38536b898e50fa0232a6
File Path: C:\Windows\System32\Speech_OneCore\common\sapi_extensions.dll
MD5: c14b44a28b7bd676955d5236367372e7
SHA1: 45570301cfd913fc966e389364809702c1b6d7a2
SHA256:6738fa88b2460f99f94904f936a4ee75ef1c7416d82789887b71a5690f53ae30
File Path: C:\Windows\System32\Speech_OneCore\common\sapi_onecore.dll
MD5: cf0520c47b47824c91e462faf5628842
SHA1: 53db7cf443218fdb1097fc81203f292999d502c3
SHA256:995558512584d7a23fc88c9a311a19789d86c1a7c44466893f31a7c244ccb6a8
File Path: C:\Windows\System32\sas.dll
MD5: 5f46fec4bca81562f8702650705b86d3
SHA1: c974e9c0f66ee41eedd15d902a9113d97291bf56
SHA256:7d78f5e2102c8e12b591e8c38c95f400a4b3cc3ce911f26b9453d5aaf7f8532d
File Path: C:\Windows\System32\sbe.dll
MD5: f4d42f58369ea0b8c5817dc5c004f11f
SHA1: ac8d5d32dd31db981340f67e8cde99d2e785202c
SHA256:4e377499e69dc87a7ca725d937655066bbf700e0f53f1bbcaf55b74f6384d1c2
File Path: C:\Windows\System32\sbeio.dll
MD5: 179ab2ef9eab65e2a7b53c17e02e796c
SHA1: 99c45898994d8caeee1d1e8f0a6e0c4a85ad2f38
SHA256:609be2915d4f32317999c56b69d26c463c62dc6795f5ef2687ca16784e838add
File Path: C:\Windows\System32\sberes.dll
MD5: 28e94a2502499106319d557fc1bb0ef6
SHA1: 5ec4bb10d6f83e06c666a4c26f353e8f95c0e096
SHA256:3095ebeb895aabdc0887793ab593830aad819c4d40b53a4b6ccc86ad0da3aa3f
File Path: C:\Windows\System32\sbresources.dll
MD5: becb232cd767d5b1a51066e257a08edc
SHA1: 465c3d7d0a927991ecf50d318ddffc15594ea8d7
SHA256:34ab38333a0d619bea05491c4d29e22ef967aa5f34c8c09666767bfb82e76651
File Path: C:\Windows\System32\sbservicetrigger.dll
MD5: 6e86e7c7633ae1849a4196ff022c7738
SHA1: 391ae68c6d0777cc1a7838d01796ba1d42680ffc
SHA256:f79693fb7d8279aabf2e364e1e96c6dd8c2d4fb70db3fe647e687e26b754afea
File Path: C:\Windows\System32\sc.exe
MD5: 3fb5cf71f7e7eb49790cb0e663434d80
SHA1: b4979a9f970029889713d756c3f123643dde73da
SHA256:41f067c3a11b02fe39947f9eba68ae5c7cb5bd1872a6009a4cd1506554a9aba9
File Path: C:\Windows\System32\scansetting.dll
MD5: c86c56d2d4c1be470d39a545ef372e38
SHA1: 311d19982ed0217d01e53a517f9f8cd83baebf3d
SHA256:fe436d46e1279f19d6555865889e67bf2ba0d3f275e0096c1ed01d1354613cb9
File Path: C:\Windows\System32\scavengeui.dll
MD5: 7a47d16b5b7915151f87ba44a380dd13
SHA1: 06928329aa48f52ed2c72e9ac6190f45a0450443
SHA256:9cec64368273df892e5f6e26ecd270a2a62c4fbcb0eb80052128da9aef8e4cfb
File Path: C:\Windows\System32\scecli.dll
MD5: b32be99abce204ca92559c054ae4336c
SHA1: 530e8da12a37e669be7c292e39608d523f216c89
SHA256:7cf92060fabba8ac8e50c8023748b313b1432d8700750210a80da32049b24cbc
File Path: C:\Windows\System32\scesrv.dll
MD5: 8049775ecb3a400829c10ad8d737ed4d
SHA1: feafa0658bdced377ed35681b50142278b51853a
SHA256:5936dd678c90af9f906f939f6a662652ef96f3013eb15e77cb1b284a8b66c8ea
File Path: C:\Windows\System32\schannel.dll
MD5: 6387c63ba01a459f22bd4a7ea7ecdad2
SHA1: 536f559dd7f8909c44ed0e91822a8a06c8ce7a55
SHA256:5d079db097c5e8a86bd9af8c711d9749d0ae560a5e5582486d8af889c00e9500
File Path: C:\Windows\System32\schedcli.dll
MD5: 9428bdf5224a4bdf7acc2f2465953967
SHA1: e5d4db920408a0cc0465a9d4d9b3b2ba69911a66
SHA256:5ba7f054de365264c2a3c03673725fe7072c8b5197fa2b06e3cec4ff95e1eeac
File Path: C:\Windows\System32\wbem\schedprov.dll
MD5: 00a0303aa205b2c6dc33d69ac3e85915
SHA1: e14587c81d9e068d1f477174d1be60010bbb1428
SHA256:0d09b8ddd32738cfb145a0bb3bbd84c49798b3e7ceec88cf9cae0e25aa40fd2b
File Path: C:\Windows\System32\schedsvc.dll
MD5: 4ceafb89293ac89959c8d6b5686e2081
SHA1: bbbaab9cf361c2522e65c4f686134d9fcb97982b
SHA256:ad91d865d465f32c3691ec74a902d24c6a52fc81266ec7b57cb6e3b331c82a6c
File Path: C:\Windows\System32\schtasks.exe
MD5: d4da03b7bb20b7e4f1b762a365d4dd4f
SHA1: fce60ebc7ebcc8b09d5821338391d800e7b37591
SHA256:9a80453518078badf0679b0cf30f50a83163e5264a2665c6052cc27f168c50f2
File Path: C:\Windows\System32\scksp.dll
MD5: 74dd04de0f8d3fd5ee70a3766d99c81e
SHA1: cccb33c26d1061f36beaeeab6826618737962baf
SHA256:cb6aea1c015add9f1ce1a0f0a21fad61eb0360f58d7314acc54009ef93130628
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PersistentMemory\scmbridge.dll
MD5: e025da0b52b275fe8b4b1268fdc37f56
SHA1: a7fbac352ed8895d6f21adba7adbeeee19b60119
SHA256:c0764f5e4f9b90058891d58d1926aa3cf71864dbf2e62c6a78ab23af88b3ec17
File Path: C:\Windows\System32\migration\scmdmigplugin.dll
MD5: 572e310e23d53ae12c9a481cae970aec
SHA1: 3e9bc873eebf0fa2e6e67f591e773906c547bd12
SHA256:b01867d5c210a6a5452f85ba5c4d81027747ef915e8ed15042e85979a8477755
File Path: C:\Windows\System32\OpenSSH\scp.exe
MD5: fdde3234fb7584f0c2a4c7fa8eba6c19
SHA1: a675309e895da98ba4745f3c80437243274c993f
SHA256:9f109ced3d575702764073be91f83e46501db38659c6192e76a30e219f7ca9ac
File Path: C:\Windows\System32\wbem\scrcons.exe
MD5: fd8c66ad69ccf980e08ada4ea35fd3fb
SHA1: 0102a12e468dcc2b40681252e311b6afa3c6dab0
SHA256:f96c187199362265fac87adb337db242d24f9b313407646f89da62a1ed12b6d9
File Path: C:\Windows\System32\scripto.dll
MD5: 9dc811a4fca7d4d0c14ac1a161955355
SHA1: ce365cf9bf4f4ce3ece493ce2b5815916a23d12e
SHA256:5a61f6de00b8102a23ff12824f1b511406045d69cc1c20d3ac37bb106d66d32b
File Path: C:\Windows\System32\scrobj.dll
MD5: 5602752087367038537539586085fbfa
SHA1: d52e9ac3d553e606a4af6558ce93b8868f0331c5
SHA256:5f41cdfab27dbfd18e16dbe0a23103c49a74aadff16a7da1b18f641c7b18d81e
File Path: C:\Windows\System32\scrptadm.dll
MD5: 307193ac802076c1113315e1f2459348
SHA1: 3ead58a5043c4aabb659f97cab65769321271659
SHA256:2f7b93dbde768986c71d3498f215d1dc79b8bab6d9b4a1744ae34217cf4db7f7
File Path: C:\Windows\System32\scrrun.dll
MD5: 7b1a7b38a533012e244ce6ede1244d33
SHA1: e270c03551d10d7e02e218d7ab68863b2e6549c7
SHA256:3a55dbae7d2657aee5b63277e210d47c648a2d45e7abe7b98dfee52ff46eef6a
File Path: C:\Windows\System32\sdbinst.exe
MD5: 986271f3f0e70aacd31985376309dc8a
SHA1: b57f4cf8777ee0b4b918419cad107d8dfb195fd7
SHA256:f5846a221ae2c432667527ea5aeb5054945314ec10bd611aef9058281a96b2a8
File Path: C:\Windows\System32\sdchange.exe
MD5: efe8bc3169508222501088a6b6e7d16e
SHA1: bde26907380080f64f72ef7635ce24ff0062a2c7
SHA256:9da80d2496f16939990f9a04ab28d4aec828e205faebed16b040f2a684334c2c
File Path: C:\Windows\System32\sdclt.exe
MD5: d421348d7cf167909c93554cde5c581f
SHA1: 835bca2e01d282618778d027eb22d4328d032a4f
SHA256:613f2861d14d7099179f86d407d65af25af76793636b3054b3c5a345da8889ce
File Path: C:\Windows\System32\sdcpl.dll
MD5: e130ac012a4a0e6b0c89f9931d843810
SHA1: c99999b244fa5daa3e443b9b226714bfe3922e66
SHA256:b2a0a4ab1b37a84370e548b9fb912ce53764ea0cfe63056daaf6987a4f057831
File Path: C:\Windows\System32\sdengin2.dll
MD5: 66ec7f3200b6134bfbad5bb1b6161d54
SHA1: 68c1475e707440ba4d0965ec030d18c7af60be8e
SHA256:9ec4fa6370412a3e07050b0803259e43e1c5898a2a833839870a62c640b7c5ba
File Path: C:\Windows\System32\sdhcinst.dll
MD5: dc883e58ec6305d84c5fb2a1ba3e96b8
SHA1: b54650148edc1ac58702b2f58acc5b3eac188ff9
SHA256:cdf7ce50886ae84480df2486f5c6d16d9f2f78c11aa6648b28e7ea14037a0ed9
File Path: C:\Windows\System32\sdiageng.dll
MD5: e03232e637efa4229230aa1e2bdf6026
SHA1: f7a25631ee012b9f1cc054231a0bec10c82bf759
SHA256:ebfb5b98cc142c28dce95ea05d46d36abfbab4568d16a8bfae31091744339806
File Path: C:\Windows\System32\sdiagnhost.exe
MD5: 28261f5b405fc5c2ad04cc86a4b83b63
SHA1: 847ee6d966c8732e6f586463792143a7a2428186
SHA256:2a48558d6e356c8666390c2671b232ab4b32dfce3ccecd7e83cbbc3325b2b326
File Path: C:\Windows\System32\sdiagprv.dll
MD5: 3b7bea6ee0710fc4147dc34ec8fdaaae
SHA1: 4bde2d5600dcac9a94602455b9685140e578ae03
SHA256:2be5d451da07b9cf1966026d1d239983340a2ac1a05ca51620b1a9856cf87055
File Path: C:\Windows\System32\sdiagschd.dll
MD5: 1890addeb207b69040bc0372d9cbb6cf
SHA1: 586770c9101d3ba0d3c4ed9e3922902aa7e3428f
SHA256:8303232cebe2bacd16c3887f083a5ec071689eb08e6a0cdb7bbdd0b6e24b93d0
File Path: C:\Windows\System32\sdohlp.dll
MD5: 4557f711c887667955fbd3d2f99fa7bc
SHA1: 5ca2e730dbe1f05d51ab3f16b90f06bc4f2a7f9a
SHA256:40cedae1544eb11f4fd9170a7eb32cb9253da993bc14c8ec32a4f3ee4809ced6
File Path: C:\Windows\System32\sdrsvc.dll
MD5: b471c3d63b659bac64283ba5aaa5acd0
SHA1: 0de8c6f2ee17fed3deb4a8128c2bbd01fc0f3690
SHA256:b7a90e20800f68a27a462a0575978832afdec078be8030e74e89865cb9366639
File Path: C:\Windows\System32\sdshext.dll
MD5: 6db938faea2f39d8aeabb264be7636b9
SHA1: a2ce71c202871094aff824e12fdd0259ea6c5534
SHA256:7eb29302c6cb4280d0f657c138a9ed5bfe0ddbb40d1014eda6d12ae8561e7deb
File Path: C:\Windows\System32\sechost.dll
MD5: b5530ec897acfbdfa70c42e38abffb35
SHA1: 67db2561e5eb977c01fd1e9a74ed56f30cbf8eda
SHA256:16cc87808786ae2d77e6d79ef1a8061365d80349dfb2bc949e409d9007daf7e1
File Path: C:\Windows\System32\secinit.exe
MD5: 1ce1954ee68a2c53d8dabbf8783e118a
SHA1: 750c766342d70a17bcd880134f85159ddce4cf40
SHA256:2cdd87c41c0865de240aa3324492c66eded2ee0acac2e0532a92cdc0d664cd23
File Path: C:\Windows\System32\seclogon.dll
MD5: 126653a4e22dc5d1721c1eebee88a525
SHA1: 2061b0ef4f5ad10d1b9b1454eb55ba1cfb908e45
SHA256:4fde516b5715a627e3dc2757f903875a33ea6255c18f764dd10ed33a78238d55
File Path: C:\Windows\System32\secproc.dll
MD5: 7530428bda4341a92a26ed00854cbfa8
SHA1: 44074b8c329e741fabd9d37ff5b27037c70d4da0
SHA256:6b2b08f87881859454a6039b773178a632086cb4df68de892e6fff0f7722bb39
File Path: C:\Windows\System32\secproc_isv.dll
MD5: 7b723da552c427d7a022419518f78f12
SHA1: 6770ecf8f30eb84902c3fdb4cc08d01dd1d8f6bc
SHA256:75bf2246a0930af846e5c9961f3c6fd1f87ee94accd8292e397370e2c0c4d818
File Path: C:\Windows\System32\secproc_ssp.dll
MD5: 11f4363352f489ab30cb4943ae82af69
SHA1: a20adb3ebedf650a7b5d980e0fa63c2da8e1b158
SHA256:886d20d45e501d6af5e75c54fa27215c352f5dc18505ab67da300356f9894c98
File Path: C:\Windows\System32\secproc_ssp_isv.dll
MD5: f300164dd4c4644d061360bd815740a6
SHA1: c0da8242a68cdb1d5eaf6dbfb6b0d56d67ae9eca
SHA256:95c4e81fe1e75908820ca809a0728f1544ebb6afd58cf31b354ea64e461dd365
File Path: C:\Windows\System32\secur32.dll
MD5: 41b0225725b21a17dec6728867ea99ac
SHA1: 5fff361f660111f4763d584f44632fad65158dde
SHA256:431ac7f960847784cff8235b3e61359283070788810d43f1690ec9aebb9d4a81
File Path: C:\Windows\System32\securekernel.exe
MD5: 4b7dabb51ee63e8502517c6616940ae9
SHA1: 0f564e2ed40d874a64cbda63488a622cbe8c6a91
SHA256:40e03060d08602a49266d69cb265896434106c27dab2821a29360a6d94f8df7b
File Path: C:\Windows\System32\security.dll
MD5: 1ca744fc9b81170501134518b89097f5
SHA1: 6d22295a964a17b61b64cdff0c8cdd14bfc7ac70
SHA256:f8b73fab687f20a3574df1b823686fc53c769cffa4b80610f81bec13a29292a4
File Path: C:\Windows\System32\sedplugins.dll
MD5: 0c4b3b8740274056b1b6b3e0230aee96
SHA1: 1549fbbb6a366c9cc9da03cb0704d549a4d7afe1
SHA256:41b0e5dd2795abeb347f1e85be172e0d8abc08e7538485cb6107b0caf2968287
File Path: C:\Windows\System32\sendmail.dll
MD5: c162cf39b1e40c29a1787d0bc1ad8594
SHA1: e8c8c84a25b8406df33602d6f907af4542098740
SHA256:1306f025775d10a05efd31a2048e2816dc10ddd52dc6c7508135237b4a91c6d9
File Path: C:\Windows\System32\sensrsvc.dll
MD5: fda88d6e3d8c1c7fbba95bea54bd9844
SHA1: 934937f12e30de912f9536462c47d08d4936ade9
SHA256:f25b1829bfc78c192a26a25f6f64e230158f25d3ea35917f4b33f5273097e125
File Path: C:\Windows\System32\serialui.dll
MD5: 49ada3858aa847eb44233471de7085fc
SHA1: 567a04448437951afd02ed825d8fe31b1a20d3e4
SHA256:2dc010cf386d3567b2fe036240baa7848e1a71643b540c85f11a0b3687cb5455
File Path: C:\Windows\System32\services.exe
MD5: 4eacbe64bb1e7d58e8a26340ed1c7cbd
SHA1: 6703d48349de8c836c0eaffac5cfac7679da7f60
SHA256:1efd9a81b2ddf21b3f327d67a6f8f88f814979e84085ec812af72450310d4281
File Path: C:\Windows\System32\serwvdrv.dll
MD5: 1d7835dfe6fb86fc1ab1ce750c0b6f9b
SHA1: 1a5949d410c245ecd0a7260f84e992e3189d3506
SHA256:a76a5d1a6b97b9a50188c34c46609c7f533cd372b3aad7068f5991e161a04b13
File Path: C:\Windows\System32\sessionmsg.exe
MD5: 822de27b50086b9db96c3a3c5d971417
SHA1: 7fa1960b53d9db726f31e30d20ac46f3dfa5febf
SHA256:5f49e20c0f6a8457846ed3275caeea5a2ccf2465f6c7a67de1a859a6c7b2777e
File Path: C:\Windows\System32\setbcdlocale.dll
MD5: 05cff15ab2be64cdb74c1a542802f7bb
SHA1: 365064133164b804317734f29e503749c5be0791
SHA256:6f4a4f78ed11823f45fe9efeab507cbf8bbd90a415cd4151427b071ecc576dc0
File Path: C:\Windows\System32\sethc.exe
MD5: 6757fb47e95b8db4f5d1c857b13642dc
SHA1: 1442a977a6f0505ce35c6444999002e8fc93bd4c
SHA256:7b58305c6200e683af425a8fca93fcfcaa181a853529ae67bb368804ffe44ee9
File Path: C:\Windows\System32\setspn.exe
MD5: 9dec0f79d40fb78ba94e770e2d8d942b
SHA1: 68a1857d6f40fd5f6cbc05d49896f71db556b16e
SHA256:3ee597fa9b3333ab491807f48aec985c4429f975e0dabce2af0ccaa182628884
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\setup.exe
MD5: a052fa304611587137a9d0251172cbce
SHA1: 70802a84ef7607e33b6e09097b5b0fe7bae2f0b4
SHA256:8a3e94ceafb6e9405f82d42cdaaf8319b7ee697d83f82a9bbb10abd182cfa4d8
File Path: C:\Windows\System32\setupapi.dll
MD5: 36c22bb0247564b04a0b8511d8bdedbd
SHA1: 0b4ace97c102b69259f46e9d2a7fe6f308e25315
SHA256:d4c6e7c540afa02ec55a924f49dc814f004d48f82f21009bd4e69ba2585ed665
File Path: C:\Windows\System32\setupcl.dll
MD5: 832ebfa7164d4eb005b878babf3920c0
SHA1: ddf13102c661cd5c1db1a489daef93efdfe7fb4c
SHA256:8773e5ca1529ed867b5ee36b463a604f7a25ce11d0990ca0e47acc203a479fa0
File Path: C:\Windows\System32\setupcl.exe
MD5: 803cf3979ab357073aadcc2037eecb05
SHA1: 69291c84e0bb448b3c009ab7ae66ef57dbe4a43b
SHA256:290c11f05c88d16192315c486f444a0e271bc22c789fe44dc3bce73b4e973799
File Path: C:\Windows\System32\setupcln.dll
MD5: 3edaf23c63f3e8fb7639cfcafe448235
SHA1: 45593fee4c4cdb7ad7cb8c0a0cf1b2d3bfc4698c
SHA256:d49e23024ada9b74b43823f74b1d6d12f22996f4de7e1839948e5edc5e103573
File Path: C:\Windows\System32\setupetw.dll
MD5: 9e8e7664b3c7ca348317cf042b5454a8
SHA1: e89dd67263c7d04996e87afcc115e98e0d2e600d
SHA256:5aa56763b44eb9405cdcb2167e2f83503efbe2873827ecced9e9d6f0dce4c981
File Path: C:\Windows\System32\setupugc.exe
MD5: 6487be15d63bd44bc82ebd56102f0671
SHA1: df9708d8c5304bc9436b6d3176e91f43b5c5274c
SHA256:46e2f71334916f12926514ad0316cd8efd3bf1486fe169667d3de37267eef8cf
File Path: C:\Windows\System32\setx.exe
MD5: 7d809ccfec9a92bc2c6b35247473245b
SHA1: ad79e24ba010465e964941573289408ffc342ed0
SHA256:f207f3bf4b4d3f2c73db94baa69ce81cc0675f7c638b5d747c8c46f4323a2f44
File Path: C:\Windows\System32\sfc.dll
MD5: 9dc819af0b5ca106a4da5ae05a6dbaef
SHA1: 37ca4c669dd8b06b344e707cbd765c5e01a23f62
SHA256:eaf670d460d50b9250e634ea2c166578ad6f5863b7a4583640217fd6cc8e2a45
File Path: C:\Windows\System32\sfc.exe
MD5: f0600834bca330548f261fbaadf783f9
SHA1: 8d76f73ecbd6837424c1845ff3e3bfa09b16f79d
SHA256:e7a57be660b32aebec5c59786d9f56de1dfb9e4bce2b1aaefea94caac5c63e42
File Path: C:\Windows\System32\sfc_os.dll
MD5: 7e9d58e0e39110db8123acd99af9c353
SHA1: c0289450f78272d418ff5a79731d2e0f43268b10
SHA256:49c688e7c5afc179b66f2b043c7f5158c23b0071a5e32613bfc4ddc7c50e983e
File Path: C:\Windows\System32\OpenSSH\sftp.exe
MD5: 72c41aa478ca868f95ad0936af65818a
SHA1: 024b9df2efb0367cf200f34085f71871ed931249
SHA256:a354eb6416ab635ab8059fe07fb87488793eee30fab09429e00974dbf38f90c1
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\dcap\sgx_dcap_ql.dll
MD5: 3fdec8ee4c800917a2de510f0969e202
SHA1: 7789fb77cf6ce51c799732f91a7218417e0d5a4e
SHA256:b8ea066130434929a545fb272f5e72d9b2eb0535dd688cc731ec98cd62035e3b
File Path: C:\Windows\System32\sgx_dcap_ql.dll
MD5: b21d6054daced162c23d85f92cdaaae3
SHA1: 04b49809a47778dea4b38b369586624f9a7af949
SHA256:acef61ccf36457b7adfcd8444659b09d63b4ee06dde50d637185dcd2aa6a5d4b
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\dcap\sgx_dcap_quoteverify.dll
MD5: c1ec7328411922ce59baabc137cb0773
SHA1: 5d0740c9487ed2a952133658a55d7ec2f23db98c
SHA256:064560cc056ceb8b85a61db38ebd9b1bc2cbc1acf928706fa371ec2220b2463b
File Path: C:\Windows\System32\sgx_dcap_quoteverify.dll
MD5: 6ad7cb25b85016dc19870e98c89dfb30
SHA1: ef7e8793343b207bc98ed1014ecd9f5c1ef55dd1
SHA256:752343a77b7a064866126e1528174e0693c8adaf341131f604fa9c070b49b2a5
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\sgx_default_qcnl_wrapper.dll
MD5: 9f9d6f66631cf1ac3f010804951de26d
SHA1: f11e49b5137f7e217067852321d694d414e21c36
SHA256:4b722b9dd05373a4e3ec6714520fcff83db8d7100fc328800cc9fa788f80552e
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_d372a4ea3b959b1c\sgx_default_qcnl_wrapper.dll
MD5: f931386f9243364741615deb03a697c5
SHA1: 0ee2046c85da43f9210a77eb7512a2cbf54dacd0
SHA256:44af18ae49286911bae1db8d24f1bcef56dd0e4babc0b1d1aa9ccf4b7e05cb8b
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\sgx_default_qcnl_wrapper.dll
MD5: 9b13b1f50e6495249cb1876492c685c7
SHA1: 999515f6425ccde26765f1cb09fdd75440cefe14
SHA256:cf8685c99bd66ce4ab0c1e4ea8cc929da717a3580e34f6c39a0dea2f4bc19af9
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\sgx_enclave_common.dll
MD5: d911b7858eb01b261bf998e300667d9d
SHA1: 2533db5808f0dfe7e9045b74e01ef5bcb4c509e4
SHA256:5811db21c48136242c0be490abb3e82f3f24b777f3e1550b901f635512456ec9
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\sgx_enclave_common.dll
MD5: cd930d2e96d6541efb98d2e8bc0d7d1e
SHA1: 06360e72fafb0026fb5db98ff8f830e100cd9db7
SHA256:76186058b0216b8439fcb5f429c8299dc76e765359a0bb10613d5a9feeff0310
File Path: C:\Windows\System32\sgx_enclave_common.dll
MD5: 69d7e7da6ac2f8c98269881ce98c3333
SHA1: d11b0407714ea4060b70ea0361286bd3ab513e54
SHA256:46754e5598ae0d91a2f0548575c960b116dd156a7486f6d5de690cb6d728cc0a
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\sgx_epid.dll
MD5: 9d833bbb9b49aece3f9b3a51859db14e
SHA1: b1f1a68507f2e81edb532a9c16ff283a3f73ad6d
SHA256:b1d9d1aba4eabb10b1d53520a3c04586f87425ebbdab0372288eb11e40a6eb93
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\sgx_epid.dll
MD5: 241e66a09dc97a3c38c477181c750f73
SHA1: 8b48eee1ad357e31edefeb55d004ac334ccb91aa
SHA256:aaad4beccb24ca9ecd093a50b62ebc5c03457077a3dae213f97efe5f05d50c27
File Path: C:\Windows\System32\sgx_epid.dll
MD5: 41c65b5a09af679a21e6071dc23570da
SHA1: 3f99128450cbc82c9206b08e1efb356122a75249
SHA256:f892fc20802dfbdbc67bed447b366e1c69b93b2718ff0f16c49983352db8c686
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\sgx_launch.dll
MD5: 9c4364ef9e40d933e0ef462d680b2d91
SHA1: 9d59d6f694c380cf754b399e79c88b3f514f128e
SHA256:78e130371e3cb3f04e1bbf7eef35f861db3ce6055c184ac03759e66cc3099ee3
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\sgx_launch.dll
MD5: ad483621eb828e013de0ce2247ef18e0
SHA1: 23c454548c58e5a845c9afc219f74c9a26a5209c
SHA256:ea81fd486282ae34e19c237e85ff7e2d26342377c12561789194d2fcd3099ebe
File Path: C:\Windows\System32\sgx_launch.dll
MD5: c62c18b28661dd4aebdab6cb22645f7d
SHA1: 1ac4d9de3d3cbb399b5cfaba48e233d716f51cd2
SHA256:7a91699acbc6e5a666169b4345beb82876c1618f5f4b7d57744c0d0e861dbcfb
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_base.inf_amd64_5c93a8bda659a6de\sgx_lc.dll
MD5: 5ea5d5d3b6127d8bdfd24d6d61ff4657
SHA1: 23216f85b333e7551cb158cffc6f9593c69ab561
SHA256:cc0234207882c34735978d31c9bf2505314d1c081fd8c4944c54b84ea3f0fc81
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_base.inf_amd64_a68d95086b19f983\sgx_lc.dll
MD5: c8d002d84c43d50e4657d87f11ce24ef
SHA1: b037a5978c9ea714dffe3f303a90b2e1d87d8f3e
SHA256:c6a912c2fab42d569a09ff1dff96318b7e3dd144c1dfec60024d79d3d4abced8
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\sgx_platform.dll
MD5: 219b1bf76cfdc6ef628195ebf61ae26e
SHA1: 33cfe653daf26649930992422fd9832a25f9b39e
SHA256:d39ecdca4aebbb3f5c50afc164f30698ee379bf4ed88304725ee209c78daaf60
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\sgx_platform.dll
MD5: 1251f6bb0b23b45faad8623d792e57f7
SHA1: c2576736049a732bef5f380bec94097989fcb084
SHA256:16827a1f4d8ece4490f7cf605f305b34aa2f35cd0428495f9460876432a66162
File Path: C:\Windows\System32\sgx_platform.dll
MD5: 3b74d5c801583612b5fbcd3171cf4ea4
SHA1: aecd1648a62d86b467c29fb46ac8aaae1fcbe11b
SHA256:ae68bdaec02d6da4202ecc528e7c185dc8359e93beef7dd65ffac907660fd07f
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\sgx_quote_ex.dll
MD5: c6557a7205ca1c76761d721349a0bfdf
SHA1: a239251463398a65a290562f9fb26d2bbc9cbfd3
SHA256:43183ac7667327cefa6cb6227b1dd86cfae2ed83bc17b7bceba2488296f34baa
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\sgx_quote_ex.dll
MD5: 7cd0c2ce3af809b2e4db504649523ba7
SHA1: 1cac91d6bca0dfc9fcfefecdeefa87805c5372f2
SHA256:bc29d940587cd9f8c16603eef24625286fc8b6f2443aee17ba0ec4157e106f66
File Path: C:\Windows\System32\sgx_quote_ex.dll
MD5: 38c0079d868b03c487d738faae58cafb
SHA1: 2ff3e4a0ff8c5b20dba1e8fbd36ef62ae6d8eea1
SHA256:d9f004f979068651f6d8f41ba2d1c691920e5b3909fa32e32beb19e7e70a9404
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\sgx_uae_service.dll
MD5: 061a6202e0dc238900ceeed1d09dd405
SHA1: f14942c5cc833ffe2ac81304996c0b1b64952e52
SHA256:af58fa39f6efd53a4aa9e46afaa26ed60cb6fc8aba0c490c677533c964e82f0a
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\sgx_uae_service.dll
MD5: f34ccaa3f6133255004daeaa994ab80e
SHA1: 1d6c478874bcbc3516f75fe1f1a7891657c35447
SHA256:cecd282c024b07f3bbbc51433c6eb048b2b9a75f6b77778eac2f064f8dd5ad4c
File Path: C:\Windows\System32\sgx_uae_service.dll
MD5: 1afe6eb1f1f0b195516b19944f473967
SHA1: ae0762b8dd2562fc39b79cec06ab11d85fdccf5a
SHA256:b2628db1e68908ff0be2ba28f1cfc7b3cea6472fd4afc6382fbb1c4f1810da0d
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\sgx_urts.dll
MD5: 777efd2dd6774f5f74046c28992d62f9
SHA1: 4deae55bcb16389b28398ef5a47bada0dc9c37c0
SHA256:d9d476be90081f65949a7d94c678d9e2737228ec32c206ad03365305305cc6ac
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\sgx_urts.dll
MD5: d1c69618da862f3764bf17da8ca35344
SHA1: d80c71bd8a35a9003f2184d4dc70e670dc428138
SHA256:681d4ce1a711b2031da7f84d6f07370fd75abf046a37cada6fba29445b013e33
File Path: C:\Windows\System32\sgx_urts.dll
MD5: 3cb5d56be4307c4e9b4fd74e9c9aad03
SHA1: 1a86a14279f8f5c3df8efc32c64d586d025fc8cb
SHA256:b4087c0280f410d3534b05ea14373dbb6971e8cb2e1cddc83e649851a72140aa
File Path: C:\Windows\System32\shacct.dll
MD5: 3b9a1b6a0095b50cc4e4ca30e04176bd
SHA1: c9f513ed11716675e0ff79bb4fbbb2182b05e4bd
SHA256:6338be94d5dd7f57b773e4b7fd110b989bda10230d482a136392ec69d7cea34e
File Path: C:\Windows\System32\shacctprofile.dll
MD5: bccb88b647ce63aa34c7007d265ec987
SHA1: c082b5809e2a53a5e86ffb035abbc18341799e34
SHA256:448061e20c15dabfe8761fede8bd164b3e595d319d1816bb4bcdb95435199b10
File Path: C:\Windows\System32\sharemediacpl.dll
MD5: 13e24a3951889eec99a9c3c5242413bb
SHA1: 9577178d3cf96389a8c647e2252f2b2ba9a08b67
SHA256:ddfcd218616322ec04d679aee8ee8bf31de6ab6200d2b705f8068551fc53308e
File Path: C:\Windows\System32\shdocvw.dll
MD5: fe6a6f62d96b9cd0ae25d2c16fe8b533
SHA1: 06cdddd7153a9a28a02b7d05eabec3a952e7070b
SHA256:5fdcaed44e1df3855d141065260ec07358191233443f79db8f1235c205432056
File Path: C:\Windows\System32\shell32.dll
MD5: 5c4d50414163d9d1c9a485248ec019cb
SHA1: 83d941c322d7c4209393f7a46a1a65008cf3c9b5
SHA256:e8a43f553c5d31e43a030da4dfb69c7531dd705effb375fc03522a1130c15121
File Path: C:\Windows\System32\shellstyle.dll
MD5: 08ddcb74bb83a9ccfc380ed371e02522
SHA1: 8deab928545eee367df4cf840340db38d5d44c43
SHA256:2a5e66a79a5da4fe2c83097805fbb225064db22968929f28b6bc4ec20d7f409f
File Path: C:\Windows\System32\shfolder.dll
MD5: 97bd67f2e7b2202f2d7d91c2f842b829
SHA1: 804f76bfa62b2a2f0551be9526cf09586426bada
SHA256:46a80ae4217c473945e791f84f19a443824e7d7ffd96b00d3a4c1f02b64811a6
File Path: C:\Windows\System32\shgina.dll
MD5: 77316137f33243afbc2962350fe21abd
SHA1: 3725827e1c824654ff3ac2c1964f16d77c501355
SHA256:6d35b6416486efb0c5ab2d10e4ac0b76320cc7a6caa76db7c9f35e8be8b8216a
File Path: C:\Windows\System32\shimeng.dll
MD5: 1601028f0ae5717675670fec1964aeac
SHA1: 5cfbac8222965067fc00e3ccc83743141aed4d32
SHA256:d948bde868b2b41de1fb1c0b24f37a2627289683b8e06523c2e20a1e8af9ce3a
File Path: C:\Windows\System32\shimgvw.dll
MD5: c0793810aa464e1ffd109dc15f08477e
SHA1: 0457fb23c3a0f577e455c5d12230d1b012c58396
SHA256:220164a058bf172bb1d69942441ca006492ae66d3885cc720e2fa2194d54dc9c
File Path: C:\Windows\System32\shlwapi.dll
MD5: 95bd04d2da253e4844edb267513bbec7
SHA1: d20632e03e648caa7e44e0424314f27ec4297d3d
SHA256:14e21a2f7da1a70323de21fdb8cce27b3af9abde453ae88809d05cc2357e1e64
File Path: C:\Windows\System32\migration\shmig.dll
MD5: 562f57dc8980b84c5817c7b7c1d265cf
SHA1: e515b810c944bcf06b35ae60f04c6ae06756233d
SHA256:eefd8ec6ab675e9ebcc5236e6ccf03a671e5eeecc99ebd5045c46c4abe976b71
File Path: C:\Windows\System32\migwiz\replacementmanifests\microsoft-windows-shmig\shmig.dll
MD5: 4787c4e9f7abd2ec24d2b9e741707a6a
SHA1: 27b3adc8f81d5a15f9d0c10899f1c8b911bf86f7
SHA256:16451b1212e439d6ab30de2b790d9effe76d32d0a08d0bb68a3f1b25fa6b0abe
File Path: C:\Windows\System32\shpafact.dll
MD5: f8b57a8dd2dceb145f440f87e4dcc813
SHA1: 100bf069161a80cbb8322719f7546d2439b4dec5
SHA256:54c9e209237a4c5db70b9b1ce8477c51bd081d70ba688d7bc592ab76a796f17d
File Path: C:\Windows\System32\shrpubw.exe
MD5: 9910d5c62428ec5f92b04abf9428eec9
SHA1: 05f27d7515e8ae1fa3bc974ec65b864ec4c9ac8b
SHA256:6b84e6e55d8572d7edf0b6243d00abb651fcb0cddddac8461de5f9bb80035a2e
File Path: C:\Windows\System32\shsetup.dll
MD5: 76b869d292cdc880c317cb8dfab54b08
SHA1: 272bac6cc60f26e40a9691d357d5746d280d91d2
SHA256:c377e452334b1fbcd25669d39b29061aa87c0b09f474bea72e3edf19d88bcd0e
File Path: C:\Windows\System32\shsvcs.dll
MD5: e9a8fa25107d4efe4c4884e001560fc0
SHA1: e0feda3aa7fb52cb698c96d929f58abeec04c068
SHA256:6512a43f6ae9e4f99bfa9a5a75fee853fc41491914524687c9f76233e8fa7cce
File Path: C:\Windows\System32\shunimpl.dll
MD5: 3b671c69d7cfa4186fe66868a3a2055d
SHA1: b722b5fdb47ab6c1a1b15ff98601568c5d9c2d9b
SHA256:f4357442a198860e3fc7f13511f162c88076eccc96ea9019a9dfa33b2971bab0
File Path: C:\Windows\System32\shutdown.exe
MD5: f2a4e18da72bb2c5b21076a5de382a20
SHA1: daf6d8af4e015dd9242998d8288557b253f30143
SHA256:d4e68cc9cb1965d70134c68bd1a090e0afae5b8b3d8018c6b6564852ae7bf396
File Path: C:\Windows\System32\shutdownext.dll
MD5: 42e3e0dc9ce59c1688a9eb885e8d39ea
SHA1: 9445e33cb21f32b85265726d4cd81c7896710e60
SHA256:da873b21ff1c1a159b1dc63d083713ef1d72ab0a7a7da6474ea582d69ef67319
File Path: C:\Windows\System32\shutdownux.dll
MD5: 378800e642d952a5a862039262c9a1cf
SHA1: b1b61c6b37c984b2127a8b3a08b678d597b2ee0b
SHA256:228f2ecd27c454e562dc00ddd77cdcb806956a475f0ae9de393fb1d923077f69
File Path: C:\Windows\System32\shwebsvc.dll
MD5: 077236842aa590c419c9a89940a78b26
SHA1: fa4ae8219fc4fc8ab4ec450ed53a11f2b8788e07
SHA256:c4e68c9e3907609e75b1d6f635dec7c633045e8b1c1ea647973fb9f1062494b6
File Path: C:\Windows\System32\signdrv.dll
MD5: b30d82b64008af8b8a458b68a4f110ff
SHA1: db8f98164e18df88ddcfd365b87a1c36d9e36cbc
SHA256:83242e12ca3cafcc220fc0a7202790b2260432c0254e122a3431b7945d65eced
File Path: C:\Windows\System32\sigverif.exe
MD5: 2151a535274b53ba8a728e542cbc07a8
SHA1: a2304c0f2616a7d12298540dce459dd9ccf07443
SHA256:064de47877b00dc35886e829a697e4adb3d3cfdf294ddba13b6009a0f415b1bd
File Path: C:\Windows\System32\sihost.exe
MD5: d952b2ce52d875526dcd7c9e4e1706fa
SHA1: 043a6d26b2b6f9642047c5668f0fa9631ff32d25
SHA256:62ebf6076acaa11199a26d8fb8828fe0a0de7a5551dc1ecd684e771c2fccb7fa
File Path: C:\Windows\System32\skci.dll
MD5: e2332d79887ad47b8410bb3042d9535f
SHA1: 49bd700ff74cc3fa442ca19e5c93feabc42820ef
SHA256:70a81579158ddd139398f1e59990d5b2e54b6bac03099f0cc750bfeb9950660f
File Path: C:\Windows\System32\slc.dll
MD5: 45763098a356eb3a2934bf9d7da78701
SHA1: 745df081843d2755cc17b427bed3fe22982b8102
SHA256:8628e22850356640d33e5cbd7f4a5699785c3792131c9e7d9a37352b1b2d9cb7
File Path: C:\Windows\System32\slcext.dll
MD5: c72573ec591a4f03f70185b28e5b41c7
SHA1: 2cff9299c55a4f16f53348cdd0f48abb05c65e1e
SHA256:228e76db9a7fda8794e4206c854f23654478babc92061644f7c1b175f35b6c51
File Path: C:\Windows\System32\slui.exe
MD5: 394f3f2a01b8f4cca12f44ebeb5923b7
SHA1: 8131b182babd4c3d4c1d018e04339a7ba2eba7a2
SHA256:3f181a1d3b12368970a2e3addc81eb5e744344b367a185c4aafa4132340df763
File Path: C:\Windows\System32\slwga.dll
MD5: 64f92087330b67369e9a7b3e4a577191
SHA1: 54ca6e21baa67b23dfd7c797ad5f0e07e0382cfe
SHA256:20f76a3e051cdc46c8ccf77e4128f210e9778fbec501d19f81ba81e61f815859
File Path: C:\Windows\System32\smartscreen.exe
MD5: c1d0b7abbec6b2f2981b7c3347d3a276
SHA1: 40eb62234d566b8d5fbf42c1e49d5f14a746c9ea
SHA256:25b32bc5a669c10e74daa43bf94f726daa8ffec972c6e654cdff6bc68c82e6b3
File Path: C:\Windows\System32\smartscreenps.dll
MD5: afe51789c06cebfa3d508a689233dffe
SHA1: 5e8e73d7408e71e3bf5603e320a5382a4059ec36
SHA256:faefff27e28477010dce6235ea6aafc2d6a4720d98a59953a58622a853ed7698
File Path: C:\Windows\System32\smbwmiv2.dll
MD5: 91a49a1c5e3329d43c4a6cd055e7355e
SHA1: f5817d2eb6c85633764eb4ceb6738e40d4dc2089
SHA256:6815596a0e33bcda61772f0c8d5696d790d415529c554e1a0f1a5dfb6ea08a74
File Path: C:\Windows\System32\smphost.dll
MD5: 42918aec3b8ac31d6be6fe2984c9775b
SHA1: fbf29a6c9981b34eb9fa12b4d84fcf345434fc60
SHA256:1551d0d63c2731fe7d2987725e49957bfc6ed2f128bcc97c48237338b7277e02
File Path: C:\Windows\System32\smss.exe
MD5: 54a7e1168cf0d30d449462da5fc5a600
SHA1: fc4b6f48a8a7ece73f1da2370d7b488820f10b0d
SHA256:d44c73818b0cf757a1d07274013baa87f36ebf9c59bec8972fea08c6cfb03862
File Path: C:\Windows\System32\snmpapi.dll
MD5: 0a96a94ad3cf03b94247054a10015788
SHA1: c9b4e05c26e9063c7b5cc781fb089daf348ee03e
SHA256:dc34fa5f43541de7a089a5a8c81942647a4d9e8847534ee218cb1c2d71e5cf8b
File Path: C:\Windows\System32\snmptrap.exe
MD5: 1971bbc71602b928cf9257759e3c05e8
SHA1: c4a9c0cc61b0c74043f0c9617ee100a5ee76bae5
SHA256:9d665698ff26ed333ad385b4b7a6c0f2b6806371d278e281fa4188002a5317e8
File Path: C:\Windows\System32\socialapis.dll
MD5: 148760b3f65292238ea6f0e30dee9fca
SHA1: 8863f143ef85513c4874d3ae3805ebf733040998
SHA256:4ef36644624a73d10e3db5c069832a411a0cac0087208986234d4a5c5ed77dee
File Path: C:\Windows\System32\softkbd.dll
MD5: fbd779c39bff2c7ed1aff776b7e2f63d
SHA1: 85f365cdfa224d45c6222636c494cbea779ecda5
SHA256:8f699c0e6ab0e7d375ff97ff66e9437130e915e27ac3ba90d3a535c543eb2033
File Path: C:\Windows\System32\softpub.dll
MD5: 8ae862726defff71e45d44d07a74675b
SHA1: fd017bf4604521a14bbf602fda9681ee805e0cf8
SHA256:81fb90aae309f39613ff2545322340f690f63b34271803468f33fa31c5443e3e
File Path: C:\Windows\System32\sort.exe
MD5: 28079b69dc7ef8d6dcecd0a6a0750bba
SHA1: 602a982e7b574870e853c9ea5f7f83c0e76a2bf5
SHA256:c9d8c048beec3aa7d0494a36e77d5692391dff26bd32b07a3358c010d8c84c79
File Path: C:\Windows\System32\spacebridge.dll
MD5: 73df819e19033e5ee8f6c13a7ff0f474
SHA1: 471ccf35b1de6aaff8eed468887b84997773d2c6
SHA256:b211dffdc8aad026f1d853a2a7e88b4275e9fe8862c4300113ac495397a11cd6
File Path: C:\Windows\System32\spaceman.exe
MD5: 24dc34bf344f1b634fee286ef5e32039
SHA1: 2aa14f2c6d89601abd6830e072b852648213b6a7
SHA256:77808680120025f3ef3e5f420a067876d9332bb59ca5c0c65706b1d90c03ffe7
File Path: C:\Windows\System32\spbcd.dll
MD5: 35740914381ee99fbe2100c7e5f1f9be
SHA1: 1a2cf5b0ab69c4b4848c4c7d7da0fee05b7e8a45
SHA256:934b0ceed09f072d771ffadc3096f7ee2aba344aab1550f186f7f3ba2145dcde
File Path: C:\Windows\System32\Speech\SpeechUX\speechuxcpl.dll
MD5: d50c755812b615d82b9b5c2cb755edee
SHA1: 236e108e4ab23e9ba6c08f1ba102c75edfe20f4c
SHA256:4b831e48b62d37f15f5bb465761d5341b6623db489453e932856f51d054bfa18
File Path: C:\Windows\System32\spfileq.dll
MD5: 35d6016070dc7b105760597e180c2948
SHA1: 113fd164e4769aae120eee850b5b0fd70ab65fd9
SHA256:2ccb13bd2cdb306c94edb11507539397de52422fab58f245b1a508eda9435591
File Path: C:\Windows\System32\spinf.dll
MD5: 22560bc0cbe0e792b8b61f2fcf07665b
SHA1: f8a2ffdc670bb08abe637eea5aacb4cc7124b583
SHA256:69729f0ca15c1ff471e48e050be6fc3f86add61b953307328c1dd54a45cc5ca2
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\spkvol.dll
MD5: 5833a99dc517b5cb0ab40b0146ede54a
SHA1: e7d1e84b79d77c347a601cf291992600ff443597
SHA256:46c4bede3761bbd071df112234a59e6cc05ce25436c108f27438ebfdfbc3f636
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_fdde6ecd49c3a98b\spkvol.dll
MD5: 5748cd8354082022d72d42488b3f4f4f
SHA1: c117fb44233a6f06529f3d012de21ea5b9ba81f8
SHA256:2e441e5250a842cf0e96e4f91080621994c9a62e0444f8b2ae143cbbb3b56591
File Path: C:\Windows\System32\spmpm.dll
MD5: 7ac6b4eb70cece667c348c6cba47d607
SHA1: 059609f2a53e5e4dd0d2b804cbccc1cececcb3ca
SHA256:37e00268bee7390bafe349956169a3d312b8f7671d58ef648d7fc9bdd5125c36
File Path: C:\Windows\System32\spnet.dll
MD5: aa54cc6619e99cc88ae6a08f4f0f3fef
SHA1: ed1dc90bbd34dd26c21d05e9f97e943d94634ab6
SHA256:59944afd78400a6c10986151b6086aef776ad70d51a969fa770cbb28e6b21d91
File Path: C:\Windows\System32\spoolss.dll
MD5: 9912a45bde526e9e47180a6b423f07c3
SHA1: b5987700d7ba74fac82d71bd055c289b83f86baa
SHA256:e85b9c42b81d939ae80baba7911bcbf46df5041f3288dede9d760512488b3c60
File Path: C:\Windows\System32\spoolsv.exe
MD5: 1ba582bcf7525bd7b016bd17d2dfc635
SHA1: 042ebc09b74f391b8893ca92bb9f3a3012931c47
SHA256:abc2c4cd2a5de2fd6a2fb472b47517cfbcaee6138f4e52c68c042100db17574b
File Path: C:\Windows\System32\spopk.dll
MD5: 411f003e0e213f1462c18718cfc196f2
SHA1: 01c06b62829aed153945902b9db3907d8cb0715f
SHA256:151d0af52746cbf282b5704c60aae218223d0be8f7d05bcadbc08fa1a2a696ec
File Path: C:\Windows\System32\spp.dll
MD5: f56cc3ec8e4a7b256c1b26665925d142
SHA1: 41ce1e720e9d8ae2e7ff5830e7a548a1e37200c5
SHA256:706a6197c06eb092f495421176e1ebbf69a6ffc58a8fa91a50ca1b8b7437242d
File Path: C:\Windows\System32\sppc.dll
MD5: 0120a053eb664d8c75899d0780bd96d7
SHA1: 8b963557677b8d3af6d7173de731a31eb713307a
SHA256:39e78eefa7b9b1fce2438a0c7c37d5a1aa32546dfe0c090408a4fd9a3705166f
File Path: C:\Windows\System32\sppcext.dll
MD5: 3f66d175b7922e917737cd1a85aa65b8
SHA1: 85b23f519c89bf73cdd7808c7a06e007bfd6a28d
SHA256:6118920648f0d40563527c7aa1a1d3a0287c14bd2fd642e015bbff99190a7628
File Path: C:\Windows\System32\sppcomapi.dll
MD5: 133b1d9d94e4a7d585965e0f4f4222e6
SHA1: 140b2435af0d46223c139b65dc312fea90c839c1
SHA256:9930cd6c1bc55cfcadefc51a210568f00520509c63282d3c5e4005cb9a055c13
File Path: C:\Windows\System32\sppcommdlg.dll
MD5: 25059cb01909efc95c978a189c24c20b
SHA1: cbdbfd8cd3c56efd35dc191ec26d4b629c3aaf6c
SHA256:f4561bd188608d78a65df4c509da5f03169af43b9fa3fcef2274ff766edbeb5e
File Path: C:\Windows\System32\sppinst.dll
MD5: 5a6dcb82c3f64aaf6aaa7e45ca91ca9b
SHA1: 70d66e21b456eaf10fadd8f8d76c39eca3b5f012
SHA256:d0cdcf15439cd975e0101520eed96215261dd2736a6a7647fc5bd66765b17d31
File Path: C:\Windows\System32\migration\sppmig.dll
MD5: 79c7b4d78b44598682733271b62ee176
SHA1: a950157443cfd33a8ddafb2b984bd870207e9c2e
SHA256:efad750d0132f193f4b69f4c39fd25838653b4ae31ca9d5c39ce17af2a468369
File Path: C:\Windows\System32\sppnp.dll
MD5: acc58150fe25bb5f37ae33b3d7f31d90
SHA1: c953253972562d8f06526df1e9b05ea8630ec66b
SHA256:3bc8b60a3f474904607321b9f30a0033c762b9bdcccb413559b7c9e0a0a5fbd4
File Path: C:\Windows\System32\sppobjs.dll
MD5: 949df8482b14598477248c0d82aa8c64
SHA1: 581d37cbe499bb597d6485119091142a36364f1c
SHA256:1c8ffde6909dbca8b7e76c266f9503209a59574508f7117ba61e35f71a473086
File Path: C:\Windows\System32\oobe\spprgrss.dll
MD5: deb63cb657afa1a2c58b860036493cf4
SHA1: 162ca6c12a04f7050745655c8cb75cb39c008552
SHA256:81557295a816a77d637d5780fe823762d097e9766e16edbfaed9cda96ee6dda6
File Path: C:\Windows\System32\sppsvc.exe
MD5: 986880985fdd745c94936a11b960e66d
SHA1: 333c4a51ffc7711fc556c87c915eefcbbf69612f
SHA256:3e9dc1245853694051074d3376d097727a801d10ac557b66282a48ba82f04b09
File Path: C:\Windows\System32\sppwinob.dll
MD5: a2bcea283ce9af74130a5618166a9df7
SHA1: 02d6f5d3951779254e06aea8167412673d505084
SHA256:9f54636b66ad0ffbbb4b52b4a68a70197be444c475410b13d765ba9e2ce3351a
File Path: C:\Windows\System32\sppwmi.dll
MD5: cecd95c30c80b1ca76a0bc4c94fed332
SHA1: f17adb827b6a818e40a1ff946ea3d353bb64079d
SHA256:0eb934becae76613074516745508caba49f6e6ea30aa8f92040573e9eb48a2ca
File Path: C:\Windows\System32\Speech\Engines\SR\spsreng.dll
MD5: fc3f513dbfa7ae54ef4e3498d9e9784b
SHA1: 3f29b2c3e1e34d3062b17525669cd3b6f82961a2
SHA256:67df7281ce98f247f25427232785a8d651472e21488bf2cb4ab57cbaab7be016
File Path: C:\Windows\System32\Speech_OneCore\Engines\SR\spsreng_onecore.dll
MD5: 09f8b79556e717f8481bc139c0ee0c52
SHA1: 945776a268298d08798252788d61dbe72f8ca8bc
SHA256:97e448b66f6bb38736b74e6891ff55bd4901337de1fca443f4985ccc2e4f97e1
File Path: C:\Windows\System32\Speech\Engines\SR\spsrx.dll
MD5: f3a75622e931e20dffd1daa951d71f39
SHA1: b94bb09eb306b88972397b8af555623f0655f086
SHA256:7b8f98be4bd2145e4e1e4c71c6d2a1b789c6810f0582209502f4666a035b41c1
File Path: C:\Windows\System32\Speech_OneCore\Engines\SR\spsrx_onecore.dll
MD5: 9f816b809d977398b49e539a8b50b458
SHA1: 383065f1204e280ee7025c73ad243d752971c97d
SHA256:9a13ca2016fc08bb4ed529bb087e91b3dd425e6673764564c45cb302279a6644
File Path: C:\Windows\System32\spwinsat.dll
MD5: 65e4c6401da90fd337023e912b399549
SHA1: 4610e5034961ac891234d2fd4890dd1802ffc17e
SHA256:d3ab6cc28ec3c6784d893ec67114bc9df2ef3a6e124a1eb39dc9b14e1be79e14
File Path: C:\Windows\System32\spwizeng.dll
MD5: 980943314d65887e666c6c1980f0189d
SHA1: 7d98acb923ea71a6af2d85cd6b1e7625455cee8d
SHA256:16331a2a03ca986cc851e1e12817a5bf30a73adf103481657e7af1d223d2c1df
File Path: C:\Windows\System32\spwizimg.dll
MD5: 6259c2ebf8f1b15c4b075e413bf32598
SHA1: 80ef443ed0dc3c93476b7a0edfa0fd76f2baa50a
SHA256:b206630e0c06b9bea1809d80b9f2601ee417857e7c8a22c1854e30c08ea744e1
File Path: C:\Windows\System32\spwizres.dll
MD5: 336cc8461938a2218720f745948fc065
SHA1: 23eae08ccce586b08d5286b9b0e0b84b77ad761d
SHA256:8c200e85d5f55b025a025e1195db7d095655b2212e7b4faf165f773a694cb7fa
File Path: C:\Windows\System32\spwmp.dll
MD5: 4f0a0a0bb2d11b57917346d3367643ef
SHA1: a1c7d07403859df8ed06b4d5f149e664bff7a382
SHA256:12ad99aeba99f8d572098cd8d486f17c6ed65733bb1441adac545d20daa6ee3a
File Path: C:\Windows\System32\sqlncli11.dll
MD5: 5d0e785d061e7d7bd750aba84782bc88
SHA1: 51761780cbcabb63d0aa92d0cce269590022c022
SHA256:8fffd0905009469ce19fc35907f74f1fed069dc206abca41f215ee1a2f76dc53
File Path: C:\Windows\System32\sqlsrv32.dll
MD5: a9844357fd5ee6d08f61b895a32839de
SHA1: df390c70e3f0eed335217f464852d4608cd11e06
SHA256:b68ce1d95a4d84c68471aa1c397901f4222a5083881349e87f02934191ace84e
File Path: C:\Windows\System32\sqmapi.dll
MD5: b1acbcc8db0f2cf9f92f9beaa9e08746
SHA1: 8a582029f5ecceeeb2509ccc6450793e859501b4
SHA256:c0b20de28898b3a87cd15ef7e60ab74a085438ee85092ba08ba7dcaf32b17fff
File Path: C:\Windows\System32\srchadmin.dll
MD5: cfaab0c1b12943418c2aa4886bdb8b03
SHA1: 7c19c049ab2b289a2a07857ce632b30d4ca9f977
SHA256:ab2b0282a15b77e8823e9aa7266135f7bbeb9452ad51662c2fc51acf945791d8
File Path: C:\Windows\System32\srclient.dll
MD5: 704dc81dd4f71a7eb2937c37851a11ed
SHA1: d8b4d3d298ce28e3417a6ae4d73025f7d4d5f78d
SHA256:196657079a0fd77cb4aba4576c600519934e3c2b0a7eb3c63b7cc9ffb06269c0
File Path: C:\Windows\System32\srcore.dll
MD5: 3722622bf22c6a5bb25ed8c9aa8f2f20
SHA1: a5cc378fac3a00ab3ae553b690c0a7e50ba4bb91
SHA256:aa8c02184c8c4b43f838fd4606927c580e5c17e6d88fde942b8f617a965a39d2
File Path: C:\Windows\System32\srdelayed.exe
MD5: b98ede682551a52911e63ec9648a30cb
SHA1: 95058a12ff4b51af54a51f29683d51ae49b2440a
SHA256:873232bc7da9a9c6c572cf00e7c95b3d74b863403de1784bd031bca1eded5106
File Path: C:\Windows\System32\srhelper.dll
MD5: dfc6c3b6248f1992bb871550f8d17d65
SHA1: b06bd9c7abe087f8d2d7aac5206d82f36aa70bae
SHA256:3d55e0cdda67f5f7781c1705e68eab2ae74b9bb200340c0c2d5564eb261f9b4f
File Path: C:\Windows\System32\Speech\Engines\SR\srloc.dll
MD5: 29bb9b5d6efa4a639759e59641aa5821
SHA1: dc6e55ddb6f5c5061f48238e4aec290e26ec7804
SHA256:f373673d34cc74f76f8c951b664589845b9dd82c939f6973c67e8fff7d6f9840
File Path: C:\Windows\System32\srm.dll
MD5: 630270753d642efa8751301571c4243b
SHA1: fd3af12cca4364a099f19e578f050f0b3c4bff54
SHA256:feeca607bf2e0bcdff4ab978621a8589928f23e5899cc70b2ee1969b0917c07d
File Path: C:\Windows\System32\srm_ps.dll
MD5: d09e3210d79907e8253f79776787f52f
SHA1: ed9e0cdcf357ebce2fd0e637027163a51aa8998b
SHA256:1f75c7121a933aa657b1aceccb5d733feb4b694dd1a277324eede1b2c2e35b98
File Path: C:\Windows\System32\srmclient.dll
MD5: 5ca6d018dee2c7a300193108523a5bf5
SHA1: 865d2f0c979324ec4fb81df2ce79ffed555be8d2
SHA256:9c40b358ab9b45ab7b3fb613aa611bb05a163778274cc496f646cd09c72f6b0e
Description:
Microsoft (R) File Server Resource Management Interop Assembly
File Path: C:\Windows\System32\srmlib.dll
MD5: 784274e9a7d9e680e17132cf53af5b54
SHA1: bac0b2be3db12d8513e0b16bfed467adff44cd9c
SHA256:743d6b5c6d6a198743c40f919c273bc05a3526edd6822a8512e045300bfa24ec
File Path: C:\Windows\System32\srmscan.dll
MD5: 55acb40f2244f578943b05c4235aaff7
SHA1: d7b474a79f3718b8414c9b49ae2dec8f84dc8a6d
SHA256:9761a9b55d85a602bee837cebddce5175a561d4c3c0d41b689fc425af3edc9aa
File Path: C:\Windows\System32\srmshell.dll
MD5: eb9ccc0cf2db76a0aa92a2eb34029175
SHA1: 7163076517b5b37017c02d6628804401a1d09a36
SHA256:306cd3dbc1f59a52df364e1b134fb7b014b517425c3aa0ee9483c2300471b699
File Path: C:\Windows\System32\srmstormod.dll
MD5: 534399aaef0584127d6880a9044f11af
SHA1: 1dab460ebe77635361935abb5499d77bfba09dc6
SHA256:fcc5c64614d880614c9a97945ce759cca59b3665fd692fbd6aa8641469c47b05
File Path: C:\Windows\System32\srmtrace.dll
MD5: 76ac88a72398d6716a74ed913837608f
SHA1: 7a3d2f1215e1a2a838e840bdd849522bf8147ad7
SHA256:98f72a8aec5874f711e9aa210099597e16316368893c71b0c3f236439d9060ff
File Path: C:\Windows\System32\srpapi.dll
MD5: 7b94788a57b8f708f1c2c829f5a737e5
SHA1: 374d40ccabd55a3519852b502b38e8083d46f41e
SHA256:a5625e3c70c480ffec24ef2c9a9e9548f07cc81a0337bc668fbbbb0bbab3ae66
File Path: C:\Windows\System32\srrstr.dll
MD5: 24089667ff9dfbf18f6ee81963a5cff3
SHA1: 433672bbca798b5b9237c5ca5d8caf47177edeca
SHA256:d6dbe25548f1b7d4dc115d0a5bac18b91d2f305df1756fbd84bed3aa6e952e05
File Path: C:\Windows\System32\srumapi.dll
MD5: 1ca337e2848f05540eb7bee9a9a22bd3
SHA1: e4fab35d11ae14e62ef10b110d5a9799734301da
SHA256:ecf7c2ce7d1da19fa209ef65cdf137e44285449fb44d00375750aa603fb6f133
File Path: C:\Windows\System32\srumsvc.dll
MD5: d301bf6d0035a638ec1b01744f5e54a4
SHA1: 4fa021aa6ba32ad8657c8accc7f6f03b560716fb
SHA256:2908e497813d4b464f6d72cf0d49f25d808b98ea18efda1b9a1aef9e96e440ac
File Path: C:\Windows\System32\srvcli.dll
MD5: 0658eeb6b029dafbea3d9ef16be775e8
SHA1: bec4268690a1e48891b9fd35b1483c4dd0bf4a64
SHA256:c39fcc2292a86bb3e51e2d43f05d1a7368b18c78031ad16a55e9ec0c53f4de7e
File Path: C:\Windows\System32\srvsvc.dll
MD5: 85ea598a65eee14e7d3429ca56c9acfa
SHA1: 0d8d172ac67cb925f4af485d57ad5de3f0d3f477
SHA256:84e6cbb278ca48f6b2cf2ae6a0b10763738c8e396d7170daf08bada66f414d23
File Path: C:\Windows\System32\srwmi.dll
MD5: 1115ae037b9f7c304c1af0f89ddefd9d
SHA1: 9399f6a3022fb981636557336848104b7dea1cf7
SHA256:1f9f1923d646aa28e27301125b90157994524d41ee22d30488b3e6ccec2ea3af
File Path: C:\Windows\System32\sscore.dll
MD5: 8079caeefe1d047c608a4bc9c9512b9e
SHA1: cc7ae02252e9972468c623fcccf8f989fb9bda51
SHA256:b1f4e0f0e156f9c4b6de30b55c3b145e40357925f9a28f51f7f65bf8f54e1a74
File Path: C:\Windows\System32\sscoreext.dll
MD5: 4abde483d818ff5c62e21a86c37553b2
SHA1: 3dbe064d461a056e87da258bedbb9b71a531c1d6
SHA256:a7e7ee9d7d85b6727be823c6fde525520e967086ac94a1d403299e4f2baf35a4
File Path: C:\Windows\System32\ssdm.dll
MD5: 2e29bbb7fb46c9f610bbfd641c835ddf
SHA1: 0f080e418befc8f8601a50153e4278c234cdb46a
SHA256:5a9c97dee8a898946e5a9454a16de4207a4de73643bbd9ad67f3b47478534c62
File Path: C:\Windows\System32\ssdpapi.dll
MD5: c414bc017af90f4cb094fa55081aee6e
SHA1: 3deae446a124c980720353ccf2d1e9d67a9e7758
SHA256:68f40b2b480b016c5904c1bb274d8fbe7323cda5810719a147c2f4391f80477e
File Path: C:\Windows\System32\ssdpsrv.dll
MD5: 916d6b4ffc7a22903de36b4988bf3da0
SHA1: 5511346a4257f9d10f5f97ffe3768316a0a04655
SHA256:4060189a8035b46566240cd79972f08b8237a3992509d6dac2302fbbc8dfbb1f
File Path: C:\Windows\System32\OpenSSH\ssh-add.exe
MD5: 85c9eeed657e96d6f44a564586685c99
SHA1: 3bc95a67e0cd508ef35d9c90f93d5d90c4c55e8f
SHA256:45e5d01b732046019d56c1964cd3b9145c472e94cf71e910b7d314836cde04df
File Path: C:\Windows\System32\OpenSSH\ssh-agent.exe
MD5: 66969aa56e77953e596470c73a9004e0
SHA1: 2f8b62377c8ad5ca10e6eff6d46c81af9d41de4e
SHA256:71f4cc7595c6d5e93aaa14259df817c6c1d4bbcf285545fd980f6dbc86a30379
File Path: C:\Windows\System32\OpenSSH\ssh-keygen.exe
MD5: f22288ef90cc363e97bdc9261a491eac
SHA1: 480a60085924e597f5413d0d0b61b8f0dc269121
SHA256:731befcb1a1655fe46ef91b3a02982b71d841e439de362ef3b1eca5644fc8dae
File Path: C:\Windows\System32\OpenSSH\ssh-keyscan.exe
MD5: c086d5b994b17f0602f5fa8f5cdbe70d
SHA1: c374387d5b55e3283cd72eb56b2993d539d7b6e7
SHA256:2ba00213f3e384cdc396dccd5a58f17a9dada923ae8db5104ecf4af972fe8ffe
File Path: C:\Windows\System32\OpenSSH\ssh.exe
MD5: c05426e6f6dfb30fb78fba874a2ff7dc
SHA1: a0d1a4f068ed3ed585e5cec6c787521b1c0d2d64
SHA256:722bee41ccf54b88660c0e67adeb2c9612c18d739e5a8eb8c35c3d7066a95871
File Path: C:\Windows\System32\sspicli.dll
MD5: 7d54959e9301ba6edb638271f0662368
SHA1: 4826e51b08a1a8f7786135a1b173abafb4a334a0
SHA256:5227f071efdd315b5a30f3941871a015d4569d1cd6c2818d2a5293b751cf410a
File Path: C:\Windows\System32\sspisrv.dll
MD5: a30d78a286c06ee75d3447f9635454cb
SHA1: 54e95b50362932ac35b25319785a84bd98c91b9f
SHA256:538ce285d407f0e6f444d92dd83b46b624de9ae4dc0a3ae87a868317cbeb2f21
File Path: C:\Windows\System32\sstpsvc.dll
MD5: 86a824276c891403d0427c887eb1463f
SHA1: a5c812a9e74e99d3442185a5bcc76b435931a1f5
SHA256:627e7aee87431f851cb326092eaae215e16410fb1becb0d73df22507543bc5ab
File Path: C:\Windows\System32\stclient.dll
MD5: 6131ed792929a42e23f511a1db7af4e5
SHA1: 8b49385b0396c07bdc11ea3ec71db730b15850a3
SHA256:3853b94a078ec321ed20a17c88ae0b6f9995d9de7c0267e5b2a7a7c828701560
File Path: C:\Windows\System32\wbem\stdprov.dll
MD5: 736add37b620748bfb7a9427b42b91be
SHA1: e459b7e58e125e016064f09651fe22658b45907f
SHA256:682f0065c0be3f86541db29e0175d4d1d3872581e41b35b1e14a521fe45406d6
File Path: C:\Windows\System32\sti.dll
MD5: 94c7c84bd01e19a49448ae3c857e1ca1
SHA1: 27ae43102cf8f1594f6645dd3399c416e76840ce
SHA256:f4a5fe058267c894bbc126301cd5edf7f63b1d473fcc01a3a9791fddc7729b86
File Path: C:\Windows\System32\sti_ci.dll
MD5: 72599cafc6261a8da98c81702cb2cabd
SHA1: 1cd11f815fb5cb656c8a8b81af1dc30258cfd461
SHA256:750cc07d27237477934b1ffa6d8832b3c12b35e2f797d1015825b494e58bd5e1
File Path: C:\Windows\System32\stobject.dll
MD5: a2327dc8db3e2ab38d19c2de9eb489ec
SHA1: 8f574502115f95c86ef04a4fa0adad32795ab34b
SHA256:8f673af186dce6064fd516de41f16aaabf7b1d33b953257e23ad7110ffbea7fa
File Path: C:\Windows\System32\storagewmi.dll
MD5: 786c7e88c1a4dc47c8930ecfad9aca1f
SHA1: 4bbd3cf3c5c2ce0b4e92109c077dc9da97ad86e6
SHA256:ad4854eae118a3f13f8a51a47317a94cdd133a6d7ebe5fe24c2a602e7d724190
File Path: C:\Windows\System32\storagewmi_passthru.dll
MD5: 2144f9999767ed274c5000f8af592a33
SHA1: 8f9b02b78c7ff6501662815058a0ca5ca55cfea6
SHA256:20343c84778155e4b7db0862f5fc8fb13b5cfc9e8c68c6ce16c6e4fe7b20c9a8
File Path: C:\Windows\System32\stordiag.exe
MD5: 0a486dbebeee0bec3d3e2f20978f53f8
SHA1: 7bbc1977de11ee9324c5a4c3acf4724882b38279
SHA256:6a13dac8bd42767dad55d4c1ed4640f4e7f01abb08ca05ddcdc2c348fcd6f8b3
File Path: C:\Windows\System32\storewuauth.dll
MD5: 5dda3d9c4d60e478f24eb5316355b726
SHA1: 52f43568db4f1b3244053fef2e043abfebbb56e9
SHA256:4c2caf7cddf0bd6dfd3bb6428ea49e11e3524a3918297cca7cbeef8f407e2c32
File Path: C:\Windows\System32\streamci.dll
MD5: e5d1458bc7802b7647ee4bf7eafa0e20
SHA1: e942f73990453954f8852a6d4128e929a7c236f0
SHA256:21406ebfb9f68e56b75045a0b9c78a6b5c5a843f3ca22ee56cacd561f721913a
File Path: C:\Windows\System32\subst.exe
MD5: e13f626074b0fcd24fb8d870a99810b6
SHA1: 0c750e422b63f843450580e49b7a7bbf82bbbd4c
SHA256:812ee8ef9b08b0a50fbe63c46e88f11f630fdecfc9e8f1ca233e3ce72004d08e
File Path: C:\Windows\System32\sud.dll
MD5: cf922db2b2dc438ff77612f1199b99ea
SHA1: 3bef8a15c0ae7043f4eb459d8d2a3157fc37ac38
SHA256:cd444e98997b4d6e8b05c53fdb2d3650c1e06d0999be8e37c8764a9f2df73dd6
File Path: C:\Windows\System32\svchost.exe
MD5: 7469cc568ad6821fd9d925542730a7d8
SHA1: e4e3f6bbad17b41a42687b3d75ade4a10b0870ec
SHA256:6fc3bf1fdfd76860be782554f8d25bd32f108db934d70f4253f1e5f23522e503
File Path: C:\Windows\System32\svf.dll
MD5: 0f2822522c2f14c61def39d02487d717
SHA1: 8f164694a49db918f785de2d667e21de8d003765
SHA256:f20597897fee666b3fc17554a706d1acea3fb12f475e51bbb7745d248dab1bc9
File Path: C:\Windows\System32\svsvc.dll
MD5: d73f83e795f3bc100c21eda2bd6de307
SHA1: aa38af933e7834aed1c74c523dc6a2258af7cb91
SHA256:0dc828c46e057ada9934424bf00067b17eeb8e0108ce1e309c8dea4cc42448ba
File Path: C:\Windows\System32\swprv.dll
MD5: fd87c9d3cfdbf10f4b5d46b64b077152
SHA1: b02008830385d5408a3c8513bbc0dbfafb6efeff
SHA256:ee832bd8d70893300af9341a45eb5eb903c2a0dd6d0f004fb55f08fffc6829d1
File Path: C:\Windows\System32\sxproxy.dll
MD5: a50bb559f6cd16899988b8ad6d63efdf
SHA1: 037d88f62e512152de686aad6c3e1f3501995319
SHA256:e4e4514f681eb005aacad8559e04fc420091d32a94957552d8bc91a3c7d50e86
File Path: C:\Windows\System32\sxs.dll
MD5: 8ee462ef48d8a4c562190aa117630a23
SHA1: f763cd899035ad962d02b99ef5675ad80e93bfa6
SHA256:0b08d4ad5b190d7b0a9360de39756b2c95f266c2e7e10add594a6aef989007c3
File Path: C:\Windows\System32\sxshared.dll
MD5: 56896c77ebff259c18b863c1600f57c1
SHA1: 3fedcebc151857fec34ddd68d7958d5815669261
SHA256:04895b438e7cf902662c99b45ab9fca94980fa92299a53f849ff5187d36321fd
File Path: C:\Windows\System32\sxssrv.dll
MD5: 3499e1f475a97b066f30c6e938cf8932
SHA1: 86393bf1c229a7d9104431124446a32db2c14b1e
SHA256:4caa1af361e2a75d5b94fd8ec284b3c301d445bf531c7d8ff90bf0858204060b
File Path: C:\Windows\System32\sxsstore.dll
MD5: 87bc192624bb6b660dd09e9887cb57a0
SHA1: dcbfa0d20067872ce1a28bad84294b75c53b34d0
SHA256:8e3b0a7a5d68db2835d057a4535c0f1031d8a1596a0c80716b7ecae897a2b612
File Path: C:\Windows\System32\sxstrace.exe
MD5: f397773fbad6b5363f34c27ede8d5822
SHA1: 5dc1448f1420e1158fee56bdc9bc671068505e60
SHA256:ca3a519ae3ecda9a9ffd4bd5adf2b2b904abd68c3bc36e93d6cafb4f36460442
File Path: C:\Windows\System32\syncutil.dll
MD5: 83e38f57ed7d6dc32043cdaa25e021a4
SHA1: 69015a05cfddbc1a1de0e5e670a39a5b5e668c99
SHA256:3c6e0749081367d632a2ca851f5819d8ddf990f590132285a017d97141b6e7c1
File Path: C:\Windows\System32\sysclass.dll
MD5: a5ae0cbfd1101377f98f2508909a42fd
SHA1: 3d39f8fa7a4258badef88d6f1e0e2dd64a4c8ec4
SHA256:5e3eeafdfd40e643a09cdb39bfacdfe7d7cda0ecf3f2a1637d9a32312c6b14f7
File Path: C:\Windows\System32\sysmain.dll
MD5: ca4f49415f16ad0635bc5e1474685a6d
SHA1: 8a32feebda50509482344caf4154162834c721a1
SHA256:02c085afe5651fa57d9e6b63b3d93489855e8c6c0950a6b6fcf95b7cd9c3e2b7
File Path: C:\Windows\System32\sysntfy.dll
MD5: bc4a2266921716c36ae3597ca1a9b7e3
SHA1: ac85ef751b82f6cef7876783bce71bd70f85bf2e
SHA256:e9899e73c667135e752ca39aaf00321d92e65dfa83a46ecbc2c232f49e26f035
File Path: C:\Windows\System32\Sysprep\sysprep.exe
MD5: 874b45f54206b57a8d6bd304f0a5d754
SHA1: 6579a5a2f48d56dad5d376ca931039396ecb2c19
SHA256:e8e95b0dbd4d601ed1e2633dee4fe58b22dee405f79f3735bdffda42f719d2fc
File Path: C:\Windows\System32\syssetup.dll
MD5: 9c19c80668ca9f0146ef4d2ba669c628
SHA1: 6f71ee29229fc0a3602297e96f602914b20ce1c0
SHA256:9268f6a26d8f2a82344680a95c241be06ca53f27bc266a4c8d1274d4a7e128fe
File Path: C:\Windows\System32\systemcpl.dll
MD5: 192755791055308f7cdf296d375efe3b
SHA1: 1e644d5028b4fb65195c8299100c1e1314327570
SHA256:d7087f353a588248d1c727e21da6349047eb8976565e7f45869fecadefe17d3a
File Path: C:\Windows\System32\systeminfo.exe
MD5: ee309a9c61511e907d87b10ef226fdcd
SHA1: 711d6f6394333ae55a06076deb9189c04846f939
SHA256:6f87caa51bdea802045bb281fc2686a3c76364c26a3ffe6c2ccac4af5f9db37b
File Path: C:\Windows\System32\systemreset.exe
MD5: 2935be77ee7af5f93f4a527381420be1
SHA1: f4203b938c2599cd487b943fb35def6190482328
SHA256:3902de1c2504fd26376ecba7ae084d3586503de16e00a2e535e65201dab92bc7
File Path: C:\Windows\System32\systray.exe
MD5: e951653f86a2e7beb23ba5f7fcd22354
SHA1: 650fc49914018e76292720f3b22f0a052fdfb2b2
SHA256:853aba88579dfe2d5a9c4f614bb68983f3989db621c9181f235cd79103e9b2ab
File Path: C:\Windows\System32\t2embed.dll
MD5: e6db9f895f39a3530dd934627d4577a1
SHA1: d66998c3330eddf116801410ee47a80d9b379b3c
SHA256:a49cd739041c36adc3b26fd03600b49b84b763d674ac26e98ff2108108b7cae4
File Path: C:\Windows\System32\tabcal.exe
MD5: 40f4014416ff0cbf92a9509f67a69754
SHA1: 1798ff7324724a32c810e2075b11c09b41e4fede
SHA256:f31b4c751dbca276446119ba775787c3eb032da72eabcd40ad96a55826a3f33c
File Path: C:\Windows\System32\takeown.exe
MD5: d258a76aa885cbbcae8c720cd1c284a5
SHA1: 85a080da6c5a908c4c5973bf429d63b975b85109
SHA256:57b3cfa9993e52866a2fb489edf079bf4f1c78fa7525bdf59affa8f9cb4023f8
File Path: C:\Windows\System32\tapi3.dll
MD5: d3ee027950fc6d9d6b771640af1bc031
SHA1: c7a9816c1611f7af182f9364c0aad39676bf9c0b
SHA256:480d85514dda1732e8baca635a1b89c36756133548450bb3d74d61e9771163ae
File Path: C:\Windows\System32\tapi32.dll
MD5: 9a41f2a54a2fa0b81b2511e32e914f2c
SHA1: 3276c4d7be73019a6a7fe8e218a98228ac930ce4
SHA256:3cc04edaa12d7feed849f1b88e10d49b948b1ef2a62e197ac35d41e5b35dbfcc
File Path: C:\Windows\System32\tapilua.dll
MD5: 2793e297e357456899e4f72adfbe8724
SHA1: 094d8ad59ce68447d7046650ab750e71efcbbb9d
SHA256:3b48825f6aa2486904c367f63e95780d58f4ed6bbe53c5048da87aacdfe81839
File Path: C:\Windows\System32\tapiperf.dll
MD5: e1dc699b567c79da7833769ff4343dff
SHA1: 669279e5c050b90151e4e16c1087bd017024b739
SHA256:a62afa9a3148c09152ee0b2c0225fbedb0d787582fddc55eb48d040d3f9c54c1
File Path: C:\Windows\System32\tapisrv.dll
MD5: 26e9d283a8577e399227650cf5cf7567
SHA1: 573284b10148acb0066bf474849970f3fab0cf9d
SHA256:d05560234226e78fef3b725f13b2fec338e1e9156e4322b21b91aa63661796e7
File Path: C:\Windows\System32\tapiui.dll
MD5: fd9cf66b1ed2e7f399fe6a97bbbb1cf4
SHA1: a81b980708c320510ce0fc56ed80b36b1a0a3933
SHA256:5e755491cad6597181a059307cdedd6318ef74c4a8d6433b4950288aa5bc9fdc
File Path: C:\Windows\System32\tar.exe
MD5: 9a904dbcf32719fb99c30203725d3aeb
SHA1: 8f1d6f15592443874e5b5dec236f4df9cd4058a4
SHA256:dfef7a04a700b8c9a1d6249dc995c2e91a4be7583d5b534ed4c9aec546616478
File Path: C:\Windows\System32\taskbarcpl.dll
MD5: 34b3cea376ace1f4a7dcc4480d26c643
SHA1: 0987106846d0ca2a62017c1b8c2221a24e5f4b48
SHA256:e279596f981c8988e9626b9b813a7162ca7359ff22ccd751137a10b0e5b2c66f
File Path: C:\Windows\System32\taskcomp.dll
MD5: 2267d0886fd521330015cf64dd84a46f
SHA1: a6593f436ddbadec6c0cda49ab175c211c09c306
SHA256:a782d5f8fbd9daafabcbccd187d9faf6dddd4e0447f43e7e7091e3a5fb2e617d
File Path: C:\Windows\System32\taskhostw.exe
MD5: 933581dcb7b289d61b63f08544540ba5
SHA1: f45c326eb377ab9667e0d0d3ec72c4417dbb2286
SHA256:1c7b7e7026ef8307bf33afdadf1d49e7c1ee4c829260b4f6988185d22d7bcc3a
File Path: C:\Windows\System32\taskkill.exe
MD5: a599d3b2fafbde4c1a6d7d0f839451c7
SHA1: 0225bbec16cb7b23b189f811065767180eda9801
SHA256:56f8cc2c1790c389394733b84c3fb55e10977e9f0fe0c08110ac11f0fe47f05e
File Path: C:\Windows\System32\tasklist.exe
MD5: d0a49a170e13d7f6aebbefed9df88aaa
SHA1: d61ffd641c2f6d45dadc26c02daeea8dabee8204
SHA256:be7241a74fe9a9d30e0631e41533a362b21c8f7aae3e5b6ad319cc15c024ec3f
File Path: C:\Windows\System32\taskschd.dll
MD5: 84f942c1a4bd60c94ebec6643e0216c9
SHA1: 633c92f5a5000cde3235c7fdc306b2b04c501c48
SHA256:bbe733452e6ce871d5d2064948847aab2a71f7feda2c962ba4002f64e2d198f2
File Path: C:\Windows\System32\tbauth.dll
MD5: 49a432aad2ae768a321697ac15be698a
SHA1: 89b9b97279381f8e871f27d4503b4747abb457e9
SHA256:e1ed444adfc9b6e77cfff98410541419771d2d604be69ede4e040decaadbdd2a
File Path: C:\Windows\System32\tbs.dll
MD5: 133b83e8261bd82b93494c2c331eb1d2
SHA1: 64993f1d16cff02d5a8042a9304a97a875f75fc0
SHA256:eaf13f3bb215a349bfc8265892398cace66e98fff8f5a005faf1b35269846dce
File Path: C:\Windows\System32\tcblaunch.exe
MD5: 036fb2de036b18a68b046554c5f711e6
SHA1: f8a65392bb2a89dc7dad8a51cf99d6f40751600c
SHA256:94ebc27e0ced14a94e0dcba14ffabebc16a7d274f42feb22c0177c96322d5265
File Path: C:\Windows\System32\tcbloader.dll
MD5: 79aa0e9440b1f2f4d49dedaada6ffb1e
SHA1: 799a79250ee53090ab4eca197e1d3dd11349c347
SHA256:75fa677b468bd7f27d15960597a01abe374870b50a3b35f4269d43067dbd6da0
File Path: C:\Windows\System32\tcmsetup.exe
MD5: 58f3b915b9ae7d63431772c2616b0945
SHA1: 6346e837da3b0f551becb7cac6d160e3063696e9
SHA256:e243501ba2ef7a6f04f51410bb916faffe0ec23450a4d030ce6bfe747e544b39
File Path: C:\Windows\System32\tcpipcfg.dll
MD5: 9d3811d2ac2ea39e0a84cbec3e7d3f2c
SHA1: e6acfda36e5e4839f7b18c6e847aa9417610686f
SHA256:b8171603974b9cdff929fca01b73b82bda10725b39f3d23e8bc2e6cf8e566840
File Path: C:\Windows\System32\tcpmib.dll
MD5: 5ce71c956929c61df2fc8bf033a08d4c
SHA1: 7779e696b55be99fad379f4301d1d52cfbbb1576
SHA256:f7e0cb426a016ae35f56f55d4da5ec1c6dbbe43c65915a20012479456d661db5
File Path: C:\Windows\System32\tcpmon.dll
MD5: bd728f22a015600ece0ea93b8e9e5db1
SHA1: d4553bdde7dd600e87b9698c0c8cdb7e31017a28
SHA256:626f947b82c88c3abdfaf3396472cf8b99b934a75de22d053207628f1bc594b8
File Path: C:\Windows\System32\tcpmonui.dll
MD5: 0895e6ee8bb5da196b6544c64be5c3c0
SHA1: 026004c19bad087958cd7c879d674386621948e8
SHA256:5752f3c7d0494bd7bd5094016fbefc66283d4007e89e2e27b74a7774353a2644
File Path: C:\Windows\System32\tdh.dll
MD5: 9e5363dc44196fc650a897bce8fefe8a
SHA1: 8a3827c9679c5885ad38cd88bf1c4bb8fda1cf0e
SHA256:d6b79645ff0cf643adbc8277f6ea2adfb7959e7bc78435aceb3626fce932b9f5
File Path: C:\Windows\System32\tellib.dll
MD5: 0974c0de8c832d3d82f4547431643597
SHA1: 500ef5d12ec8cfe205e331d1374139e60d31ac23
SHA256:1fc78ec9e90818423194c3cb42eb2d5cf30d31aed267affd0f3ea2a29ad9ca67
File Path: C:\Windows\System32\termmgr.dll
MD5: 8c83b94a393e0bd1b6e1f8d0ae524ff3
SHA1: 769bd1531d92a94473702cfa9934ee86bc04c261
SHA256:67d11626cf45cb952f43c2148159d50e21cc6bbe41deebe4700e60ff888782e2
File Path: C:\Windows\System32\termsrv.dll
MD5: ff9bd3acd2fc22603d57faa9d68148f0
SHA1: 6b855b1aceb2a43bf6540efab52b343302b5cfda
SHA256:55708e017249d633f1a1a85247cc3897ce4c166d1f9689a29c237e62bb150bc4
File Path: C:\Windows\System32\tetheringclient.dll
MD5: 4dbad2093e46ae0aecbfa54a382a17dd
SHA1: f86a1e777ba8fe6635e3b2352611ebba34d69db9
SHA256:89d2dbc35f5a58de3d50a9dbfe89f532683d00a2858946385ae3fa36b2262b8a
File Path: C:\Windows\System32\tetheringconfigsp.dll
MD5: 371fabc06b1b279e11f1cdcf20ccc781
SHA1: 13c88c6dae800dbdf583dcef3b21e86b216001d8
SHA256:1c02ed85955b450920a8b4ebd8158e9de5af560ed068f722f43edac5407a3f02
File Path: C:\Windows\System32\tetheringservice.dll
MD5: db5fcdf1a7575d3f4286828b168fdd9a
SHA1: 771be1db978388d0098d058eab504083fb726b96
SHA256:7143458b1da42968aa89b2a71a114e1a60126df6568007d1566d5975ca9fc82c
File Path: C:\Windows\System32\themecpl.dll
MD5: 4a1260cd039473b2a133398f33cafce3
SHA1: c0f8aa01c7b2013fd9197c3a00c5fa08539a0cab
SHA256:355550ce37153e7fa46484a16483654975392e62ddcddb8fa416c02526691b21
File Path: C:\Windows\System32\themeservice.dll
MD5: 4fde481704bd80967a45e9e1fa299d2d
SHA1: 34fb9f99c9171c2e2b6e9c492cc480350fcba5cd
SHA256:7a13b3ef5c256bc1d472e29546c079bd6786bc982a26ad0e19ade3b4f7227ba4
File Path: C:\Windows\System32\themeui.dll
MD5: 8cab75cda9cc71a6751fd08faf3baaba
SHA1: 0ddecc3fa8292afad5cfc615b34e0b2ce6b72f87
SHA256:d9a02d25c5c484c5de6f1b6bc8db34c73c501cbde1fa0f9f4b80eff9a32ec652
File Path: C:\Windows\System32\threadpoolwinrt.dll
MD5: 20f3b910dabcde8b5fb70777a9db7f6d
SHA1: e48c105e089039df94e901b611ea8aed7f9f0902
SHA256:25026c90bb98ef6afb0d8a83c964ec2188ab5401fbf2341570670bac22a56c50
File Path: C:\Windows\System32\thumbcache.dll
MD5: f812b0011124f504530a0a9912d72d83
SHA1: cf23d9641b6ba06c899738fec754911a918f74f5
SHA256:a6aea7d5c84fd2a62b27b739f29377014566d4b16c69288d41a66a69531f1439
File Path: C:\Windows\System32\tier2punctuations.dll
MD5: 18ac3debaf823f27e24e1dc992f8e170
SHA1: bf8082f85dd2fe65a7c9a9b4d3776d4eedcfb24b
SHA256:01f08b4b3ea69a75bab7738c13de6b94526c2ff399e6b72d76e15f25327d32a8
File Path: C:\Windows\System32\timeout.exe
MD5: 100065e21cfbbde57cba2838921f84d6
SHA1: ce99c615b38f6fea5a76e19ae95ae16a734332c0
SHA256:c8c350fab1130644536db6a84f605791367308b995079ad494d46a8c617c21d6
File Path: C:\Windows\System32\timesync.dll
MD5: 252c2bd9fb26655e8b2d94e1b1a85832
SHA1: f3b01e036326748bb2dc3da896f96462482c7459
SHA256:90dfbfd76d987f0dc4bdad12200adc4b9e3a5b1ce38217120e2a3be0c832e6b4
File Path: C:\Windows\System32\tlscsp.dll
MD5: 9e333949725bdcd005a10c65482aa4f2
SHA1: e06c50bc45a2f88472d04835a1c416eb378f1716
SHA256:cd7df50a2310cfd71f477ae684a7982f633870b97a67491adc0ba0292be7dddc
File Path: C:\Windows\System32\tokenbinding.dll
MD5: 7adb7090c02c62dad9a29ae2bd75615a
SHA1: 81a37f840a49099790efb8d8d2a6fcc7bc279430
SHA256:65ffb0b3dd6aedd3a78a61a71be95bb77e2653fdf8b710306c07897c9000d438
File Path: C:\Windows\System32\tpmcompc.dll
MD5: 72b06e97fdb4367db82eadabaf2ae0f3
SHA1: e3c944699b3ed9de1d8bcf026fe88aa65bfda1c5
SHA256:1c1eed6eea7443657cb59062ddba05971201dc2f2d8f15c1763628bf2cc37f74
File Path: C:\Windows\System32\tpmvsc.dll
MD5: c4d375a255506b2a7b03e6ee91fb1e9e
SHA1: beb916c2048dc0b31a76178ada3cffead2c04011
SHA256:d89b813ddb942934bb03d252381d12843b1bef974e6008b2717f486915d0537d
File Path: C:\Windows\System32\tpmvscmgr.exe
MD5: 984aab8f610cdf6c9373096b6138194e
SHA1: 1ca0cb3a9e122f9ac4c183a5b8d08d2881cd1c5f
SHA256:5a41b63dfa4b38f3240ccb0923617872494e0345a673fbce3e12c33584277f59
File Path: C:\Windows\System32\tpmvscmgrsvr.exe
MD5: 7351cca725a4a18425a3186fb3213576
SHA1: dcdf831e7228a72f0990f4ff2caeff1bc68368dc
SHA256:af97009cf40d6ce9c0cdb7ca417fe0ec412b1cae4a89457f8c5487a8d3e70908
File Path: C:\Windows\System32\tquery.dll
MD5: 6c55099a7208942ab31ada50247e9b94
SHA1: 638267b86659e3315696bf9e49f7df9ff0e81630
SHA256:413175399062eefca7e501850069ac397bc6ea67e04b1f595ec61012f835f9cc
File Path: C:\Windows\System32\tracerpt.exe
MD5: a7e4e8659f4bbe9a5c9648b350cd1f22
SHA1: db66b328fc02c676f35932da83ed1f3d0e4848a7
SHA256:ae616147281a954276d9d68f04edb72c5085cadcd5ab4b895fc84784c7795328
File Path: C:\Windows\System32\traffic.dll
MD5: 5f3c354e964dee2a6974961c28e4032c
SHA1: 4a1c97e0315cdec76200ee51a25cf5abd931249a
SHA256:52f456e663002d6e1f63bc85c293e013999cf30bbc72ba87fbf2f1e5b6157126
File Path: C:\Windows\System32\trie.dll
MD5: 2b01c5ee34bd5fa7a61f5f822b8c72df
SHA1: ecde0006cd16c6f6ccf69085b6696c2d5db34b04
SHA256:52d43dde550b14152028e3baaa4294d2d3b95bff1e62f4e3332cb211d5451931
File Path: C:\Windows\System32\trkwks.dll
MD5: f4c31928e9cce3f0ba872e530d53d020
SHA1: d98d7f23402068d0bb6def43b99ce8a34682109f
SHA256:8a22f1b8183159a361f98521c591a2dedcbfd25d3a337729565dc9ee3c3af785
File Path: C:\Windows\System32\tsbyuv.dll
MD5: 66fbdc3059d28cc35c45ba9d3dd8b153
SHA1: ab93d8694a2576998ebbebabdc3d2394a1f12b97
SHA256:ae395fd799a07b2e9b5dd9fe68c2fa494d837d6d2fbb8b56af30f91a4a2c446f
File Path: C:\Windows\System32\tscfgwmi.dll
MD5: be0bb3a408758eec724204c8af51a1f0
SHA1: 9777633c586754291815f31acdb7bb3d7e9c3b3e
SHA256:f108528f5238b66fc78c4c632dd19a1838731e34afd728e90f457b6b351c9eef
File Path: C:\Windows\System32\tscon.exe
MD5: b792676216706673b65d67916460299f
SHA1: 7e7351664daea80efcf57c7a55e413c59bf53ba2
SHA256:15e3a70fd3f2972cd8d7826dfe4058255b0fbb974969828644d93256f7fb9c12
File Path: C:\Windows\System32\tsdiscon.exe
MD5: 09cee5d093127aa9c9ff4b90f6a90581
SHA1: b67e776551f3a451f0d5ffbcb6c3a9f096920386
SHA256:4fa837762a3a76bcee46f7d34f8d2e3e4ea59a0d8f9094a8ca96144e137370f9
File Path: C:\Windows\System32\tsf3gip.dll
MD5: 7f6386a25ff34a58380b02c8adc91910
SHA1: cc3e7e272430b41b5d9ba3aada6d99cae4b5ada9
SHA256:768ac20cf60440aab602d40b19647b4c0a9eabc338a4fc9d32f62b3a9c93eb8a
File Path: C:\Windows\System32\tsgqec.dll
MD5: 4d32c4182a8eed13f31c26e8474822aa
SHA1: 190ad4c22366f5ba41ef1e1a1b94e47cc111d22f
SHA256:5a6cf92b02f9794d3d9b2b4bca7e2aa5b3cf859251356d0f7475294e6beeb957
File Path: C:\Windows\System32\tskill.exe
MD5: 2393d4f762fb671d92a59388109c24d4
SHA1: 2e27346b7cff97619923c3e3199e68e7b91d142b
SHA256:8d9373ebd69f42153b0b47dbda2174811599db91630651ca01627ac1795f8d56
File Path: C:\Windows\System32\tsmf.dll
MD5: 388b630ad83fb0f7edd8a89d45b5dce9
SHA1: c51f3ffd9be3faaf9996adf9eef626f627a97a06
SHA256:f21616320ab388e32bbe4870141d0adbcd954fe496bfc5f8e08f7afd99009df6
File Path: C:\Windows\System32\migwiz\replacementmanifests\Microsoft-Windows-TerminalServices-AppServer-Licensing\tsmigplugin.dll
MD5: eec95d991b8f1393431da794a98d5b2b
SHA1: 532394e7488c17de6ec89ac80f22ac0580bf9f25
SHA256:7880e34b5fd2c1becd918abc977f063d39a4b4701430f55a03bafa7b5ad4e8cc
File Path: C:\Windows\System32\DriverStore\FileRepository\tsprint.inf_amd64_5febeca199eea376\amd64\tsprint.dll
MD5: 5d01fd51c26a7c65ca09555441dee118
SHA1: 0ab150892b6e2768563557d2f58609c33da52bd5
SHA256:ab2262c8bb8b459624e8a621f58dd7f1ca69f10ec34ee93a4df7a3fa00048363
File Path: C:\Windows\System32\tspubwmi.dll
MD5: 02279a04ba66b771c824f9d76dc04f02
SHA1: 2ce59c51e6b74e6000af5808d7a170b01874e733
SHA256:7e369830743cab57ed13a2d7dd35645dd87559a370c2ea45326cbc56c66c2939
File Path: C:\Windows\System32\tssrvlic.dll
MD5: 12d7aec9a7e54fa2e9625ee92724c24f
SHA1: b8ef005820618b896554b0476beadd0fd2502c26
SHA256:cd9c08c18e5d955a9ac4464686ea1bf9a5175fc3bb3aa2db1b98fed9124d5266
File Path: C:\Windows\System32\setup\tssysprep.dll
MD5: 69fdefe41fb1c8ccfc3c2d2586a84c9d
SHA1: 4db96dba5d8b1a7485ac4d17266ad0edf732d46d
SHA256:e868261457b53eea8f7fe18cf10bc6374bce923c2b339dc0c0ebd9bd67f78eb3
File Path: C:\Windows\System32\ttdinject.exe
MD5: 658ec075636faff2dfcdcdb33d574291
SHA1: 8084603987f3427e15d619b786b304ec9f6f39b6
SHA256:fe7c6d53bd1c68f92f138ae84ea81e045a930f7b7c585d445c3a67603e6eaddd
File Path: C:\Windows\System32\ttdloader.dll
MD5: 4a6e1e49b03b6e839a40d743d95a35f1
SHA1: ca8a1e4f17999351de99cf523e6a80926ce87d29
SHA256:aedd5f47b9cabfaa279b81b4bc025ef6cf2b29720eb7b5bc5896aaa48ddab3f0
File Path: C:\Windows\System32\ttdplm.dll
MD5: 11335d005a7ae1027ae984a91bd25c1c
SHA1: 2db9a02728053c3ec467aee59ffcfa67913d1aaf
SHA256:2f776655fa879aec905af1136921750b819a48a22788d26a3e804efae2d1a9ef
File Path: C:\Windows\System32\ttdrecord.dll
MD5: 2aedd373a3810c2d115e0f813b64c86c
SHA1: 7b2d935d3574ebea15ad31c7464b18ad3c6fe0e2
SHA256:c5c5c4a115f613d9694b9628a4cf7910b54cf61bb635ef41d23253ac164cacf7
File Path: C:\Windows\System32\ttdrecordcpu.dll
MD5: bab1003072214e86e26e3e0dbd0e1ff5
SHA1: 2c4608d0e0eb202f1a009076449edad69b80ecb4
SHA256:05a337953dcc15069d1f3b0879e15a350ac763fa98458217347a49d7dfb79b32
File Path: C:\Windows\System32\tttracer.exe
MD5: 4ec2805ee87de4264a36934e74a3cd28
SHA1: 316f8e48ef8b14480e11e255c43934efb9083dae
SHA256:2c85aed31766b615a762438218846a34e067d0a44b276b9093b908fb847ffd70
File Path: C:\Windows\System32\tvratings.dll
MD5: d67a869934cae039958270469011ee23
SHA1: 503fddb8f5dc8ae4ed3e5641d9c0b76e64973161
SHA256:46d7573bf232195de429045ed083d1dd402b707d96e694b8acedde730e6d36af
File Path: C:\Windows\System32\twext.dll
MD5: 7ecfd4cd3caf45c6a3fbef1f7647f299
SHA1: 35b81320a184c8ed3ba950e42bdccebc5018d2a0
SHA256:44f9edd1c97b8162f556959e4cb2229cc327102daf549592935f5b3084bd3383
File Path: C:\Windows\System32\twinapi.appcore.dll
MD5: b470d959d8ef6be29c72df832c6e529b
SHA1: fa9225d1fe947bec6d85ccbebf2d03e4c203c4ba
SHA256:d30e84924838542ac88aeaee9aa039784ee10f8157840565bf8fef16595f7c99
File Path: C:\Windows\System32\twinapi.dll
MD5: 3cf895fa0abb6791e3b39bcf92cd194c
SHA1: 317c7405e57544f5733ec04f48065d4a47ba49eb
SHA256:3b5769ea9e879630d66aebaaa1c81b6d76d1f9c8ec269a6aa3d21fbf1f3e48c8
File Path: C:\Windows\System32\twinui.appcore.dll
MD5: a3d74b9a2a45dddd8bdf8740dec7f5e4
SHA1: 5074bd1ac6bbe68a79d5a87420d0510c6e737144
SHA256:ce0003cda747de13ba7a5a56376f9febc0b65f192d9792fc01190066da3c8911
File Path: C:\Windows\System32\twinui.dll
MD5: 1dfc1bc1439f833f31b595085136d7d2
SHA1: a538fefe817b3c0a2473d970ee22f23720a5e041
SHA256:df88000b1aadf723e7869d3690875ecd589a403534523a98ab4180521c3447dc
File Path: C:\Windows\System32\twinui.pcshell.dll
MD5: f2b503e428e90553fbf9d3bf142ad84b
SHA1: 7a4319a2f1a8ce0637d057febd38f4b1b6909bd2
SHA256:5310cd29e3f6ae7afd5999783b6e2b887cc533eb7ba19e43b638e886e3b67464
File Path: C:\Windows\System32\txflog.dll
MD5: 9a5c1d92e87636f05236b7613b5b8042
SHA1: 6a4bec4d0d979aec62844d87aded5df1eb805132
SHA256:059ee73ad4aec1ee3fcd5849cf596545f6547ee0caaadbe06f11596f8fbbb0c9
File Path: C:\Windows\System32\txfw32.dll
MD5: 7e734e5fc4043e5c99f82a613013de5f
SHA1: adac9ad4e736c450b86c6c916d87fe3a5da57349
SHA256:ba00c1d623677d8cc119945c5729c5fc8edfa7fa8a45293d74c73518734a98d8
File Path: C:\Windows\System32\typeperf.exe
MD5: f61501c00c1acf0f631dde4982db4065
SHA1: e0e9d697bfb91b5b417139554c005190c9f584c5
SHA256:db7afa45102e023e539e145f3565859e4117a747ee86027219207e5e8f1626e3
File Path: C:\Windows\System32\tzautoupdate.dll
MD5: ae6a2ca5c1e3806bd0318c73c08281d2
SHA1: cdc043a2672f6d7fc5f12c14e8da184d53572562
SHA256:df6a0297f824c66e923521ad967425922774bc708426420d15a1e60984b541fa
File Path: C:\Windows\System32\tzres.dll
MD5: 0968c2209b9f3743cd951957f9a6a345
SHA1: 2fad8a1431b75ebd97228cee0c573273d30c0312
SHA256:3de06226e81a4ecb443842a1f5a57d10b25aad19bb55c43ea1294c130678a85b
Description:
TimeZone Sync Task
File Path: C:\Windows\System32\tzsync.exe
MD5: 433d943ce267eaa3485137e0d21a7348
SHA1: 0ffbae84afadf220cd379bc823f0ba7e95e50ea5
SHA256:3c4de3f013d4611bbdb14ea17207e4d93eb406e14e639b1d87ce217c96747cf2
File Path: C:\Windows\System32\tzsyncres.dll
MD5: d8dd76c289443abdd5835d32b9c1028a
SHA1: aa6abfce548c3ab2f1674755205ea9b8e16d96cb
SHA256:366905e144e8e19b6d73719c189c9b37222b5e2646e6cf295f6fd8456a899701
File Path: C:\Windows\System32\tzutil.exe
MD5: d707382b7d60eb8830a2da9d6480062a
SHA1: 4c721616200b2cd92d7716981999d94f549732a8
SHA256:bf331cdf306fe1d01a5b4b81b898a268d0d1c8461c4aeda19d5c67f5fad981b1
File Path: C:\Windows\System32\uDWM.dll
MD5: ef6c66c9dca2ca54491a450f5e017434
SHA1: 026d5be2286e7f27b05399aaf0d18c3f4d2654a1
SHA256:0a46ebfd202b1fe94014d7fb6b42d4ca88db36791614e33a289b837f6954fb9e
File Path: C:\Windows\System32\uReFS.dll
MD5: 09e4c90fb74b83bd92f57a3645837394
SHA1: c96e87161210b9cf5e2aa644acbf7bcf2db7831c
SHA256:6a3660d62bab91e16ea89c138dfda7a6afa8f6ab070bf7c91c76481220dfc8fe
File Path: C:\Windows\System32\uReFSv1.dll
MD5: f728db88269c92d5998e8999c36a9712
SHA1: 1c8dc74923497aa92c4804970acec3abaf909297
SHA256:e7b0c13516dfaf398f7175a682bfe8587d57cf38210c3e51eecba2f48af05603
File Path: C:\Windows\System32\ubpm.dll
MD5: ee31cbd73e5af7c250d74f2768ee6ecd
SHA1: f09c5ba7cde7dbbd109855206c4b77e4d2ced2bd
SHA256:08846f9b9ea3c79a0b94c33a19325491ce74d53a0781bb42e9ac88d0e4c0d69d
File Path: C:\Windows\System32\ucmhc.dll
MD5: ab8c8b9022e3772a07360238d09cde5f
SHA1: 82c98321550efbe234f486fc5428992defb04988
SHA256:4822209b20db08e114225506b23f820a868194bb49cd5d3fe4f018904e7229f0
File Path: C:\Windows\System32\downlevel\ucrtbase.dll
MD5: c9c70e684ca8e1d74fcfa17dbc6eaab4
SHA1: 956f47dbed9b405687429827f532e5347189f108
SHA256:c3c6ff3005623a771cf1642beabb62add5f101782b8f2b60081ab3faf2824cca
File Path: C:\Windows\System32\ucrtbase.dll
MD5: 4e326feeb3ebf1e3eb21eeb224345727
SHA1: f156a272dbc6695cc170b6091ef8cd41db7ba040
SHA256:3c60056371f82e4744185b6f2fa0c69042b1e78804685944132974dd13f3b6d9
File Path: C:\Windows\System32\ucrtbase_clr0400.dll
MD5: 14bc224c1040570fd58a452973b93591
SHA1: 7b05ca87fa6dab617de5b79f6eedbc4d34360a46
SHA256:f5189277b5ac83b754462f259188b0e876706cec5a56bf6f5c35539f1d6510cd
File Path: C:\Windows\System32\ucrtbase_enclave.dll
MD5: 5f5b9a8b9c468bbfedc7f3a9bb25e3ed
SHA1: 6aa326ffc7f5ccf0c09876f1b75f179a306646a9
SHA256:62e4a309e98d282eaf9c43e71fb5000f91a28647b31c5d950fb8f9e9ef700f40
File Path: C:\Windows\System32\ucrtbased.dll
MD5: 108b715a604d800501462fb648b82a75
SHA1: c9bec97e6033f60113581c76a97f5fc89f37520a
SHA256:19e79e91a6aadda65191ea6ddda4cc106e26c78338b05e73092e20709399f48d
File Path: C:\Windows\System32\ucsvc.exe
MD5: 909e5a293a94055d67af53a7edf27d27
SHA1: b04d2e846ef7cc1d8d224f07d2f8d7bae7f2bf6e
SHA256:2bfac411f014d87171cf09b110ec44436f4a0850b8b2cc3a4f72e7412f7a9d39
File Path: C:\Windows\System32\udhisapi.dll
MD5: dced57ce4cc08c08ee9a893f3bb2a035
SHA1: 8546b17b9fbe3c74543590670891a1cf56f0275b
SHA256:a35e5e87797020b2776b5dbe9ea2b8dd8014b9dd1ed3015d28c7908339e9a18a
File Path: C:\Windows\System32\uexfat.dll
MD5: 1f54314e491247846e3fc11273505286
SHA1: 67bba41b1f8a470800a6ddc9b4aaa2d58100b929
SHA256:c5c24b9e14b1ea0f7786be815020c1564bc677c37fd863f430776cefb8510b6e
File Path: C:\Windows\System32\ufat.dll
MD5: 9e49957fc76d930b4efdfde38a03a2ce
SHA1: f09b801922949cf8fe75a2fb334430d4cf2b3474
SHA256:8302ba672ec780585e268111c982b91bff149eb86dd1a7d8a33ae1f4bdbbe2be
File Path: C:\Windows\System32\DriverStore\FileRepository\uicciso.inf_amd64_32023cb966fd5c8c\uicciso.dll
MD5: 5331a3166618882ccf1f425baa74e917
SHA1: b32b4d4a63d09a6ea03aa4a74aabc64cc516c159
SHA256:811f7dfb3e164b7e1fc73b9355bcc8dac756a81d6a0080839e656b0a8be5360e
File Path: C:\Windows\System32\drivers\UMDF\uiccspb.dll
MD5: 9768a3cb43be957fbd72e3917b13ab08
SHA1: 2e90be3dc540d2b0bdc688f9529ef815ebbd8a5e
SHA256:335cf81a7687d528f725daef98759d061e4c0fec621b17b4c2f2e8874ac7996e
File Path: C:\Windows\System32\uicom.dll
MD5: 4e180d23611d06feb794f5125569cd60
SHA1: f3bcc1d63189ce45dfc02fd24c9cce79e47c6bad
SHA256:f70a0e42f9c6ee54f81eae9b15813a3cdd5fc7411d1fc6a614e38d650e6db15c
File Path: C:\Windows\System32\uireng.dll
MD5: 4427b95588ca391c735063162e5be86f
SHA1: 6f0568b52a122a353bdffb3aaba518b697d291bb
SHA256:2996155f9bb2cc98a293424ac8960a45ed4eb1298199e265996a11d07d143449
File Path: C:\Windows\System32\ulib.dll
MD5: 0f083a03f1e04139405a7b362f255167
SHA1: 84a82f5a448820c30473c0a43adcd3c892f737f7
SHA256:31a09e2232c5afa1227cd699e293f6fc25b972129e0eabc3e38809bc1ac0443d
File Path: C:\Windows\System32\umb.dll
MD5: 23320914ed764721405dba26d6ffba03
SHA1: 1e44316feb3c668dda7f727e628fb974d8984aca
SHA256:950c7b5ac24be8d671e8f4fb759875ce58571502b8e5d28be73e06001fe56628
File Path: C:\Windows\System32\umdmxfrm.dll
MD5: 7826751d1d6dbe45042f4d1e0cb271df
SHA1: b9b87fdd7cbe4ef1a617ca9dabbec73206987691
SHA256:556ee53c8e4e9050dc703694c2763509406a6c74cac73097b292d6c70e440ec2
File Path: C:\Windows\System32\umpdc.dll
MD5: c836a39340a6981ff4ee71e8903df93b
SHA1: f17a1e567fdc6ccec0333f4cdc64c1a4ce4a0948
SHA256:52149a7fee76e2022a8b71467b512073c0ac3b10ac763f232adfb38f69ae057c
File Path: C:\Windows\System32\umpnpmgr.dll
MD5: 0c2d90698dc8a96bef1d3fca258eacd5
SHA1: 82cff51c119103206c51c4c808aa45bbbe1186e3
SHA256:44ae9b80e19198bc23e39181170d04f870fa8f5778ff0537f3bf886e35add104
File Path: C:\Windows\System32\umpo-overrides.dll
MD5: 404bbf030215d08831f4a1ec23163d90
SHA1: 111274c8aed1efccc9e4f2a67de4ea183d0bccbf
SHA256:232ed2974a029d8a3c8cfd2d5bb8d97fa22b610c7fedde0b1a3e8cd9c37f2316
File Path: C:\Windows\System32\umpo.dll
MD5: 222740b4102cd9ec85b1ca172b6033d5
SHA1: 06d05b808e325227d756ca92f0e1b6260c8f9e45
SHA256:c6a6febfd06bff54ac74ea3ad39ae16670c5fcb8b4ba9f4adb32491ec251a30b
File Path: C:\Windows\System32\umpoext.dll
MD5: ff0d1170ee5e67b05bc877c12dc90af7
SHA1: 81099915ebcf0b5ec94c12128a7ba5ef321fa0c7
SHA256:39e016e49036d51294342afa7ce654b3f3f8ae00984fbe841d0199ba02b53806
File Path: C:\Windows\System32\umpowmi.dll
MD5: 163d2d59dfe2f1eae5d930e2f1d6926a
SHA1: 4edeb468571245a78d9c0d36c5530b2a83dd22b3
SHA256:339c2fb094778e079d51f830e4a8b7c011fa06b26d4887698f53370322fbc5af
File Path: C:\Windows\System32\umrdp.dll
MD5: 0bce88c3e4cba29bc1538f62567a0753
SHA1: d99833aa9388af19562d28bff9b08a416409d00f
SHA256:32f98f6c5d51559d90b529187e9b994d602dd01179ef8bcec18fd089a1915477
File Path: C:\Windows\System32\unattend.dll
MD5: e672388fead60fc4ec08ff48fbf3e0c4
SHA1: 0cfe9522417806b01ae0e79036e6e6099aebedc5
SHA256:31c11ef13621b0ee530f7ac0d99a379a097191acbcd7505b4f09696bed6209fe
File Path: C:\Windows\System32\migwiz\unbcl.dll
MD5: acb9ad2524f56a1d968b35fdd075cbef
SHA1: ec1e27c2c7596f88de7fd40ec934bbfca91c2438
SHA256:effc865cb2faa2017cd5481949cebf2d6873e0f0904bf668bd03a73d6b4bac97
File Path: C:\Windows\System32\oobe\unbcl.dll
MD5: c6e8702ef2ddfd9634db702735c60601
SHA1: 715aaf2bfff22773486fcae493276e0c2ae345fd
SHA256:94184967df7dd23ecdb2202505de6d7be448aef7ade6188114536c13f62579d9
File Path: C:\Windows\System32\unenrollhook.dll
MD5: d7733f0ab839eca19011fc0d56c85fe9
SHA1: 6c7b7768a6c6e79d092a8dadcb68c67d876f3a93
SHA256:babb6663b180df936812b1493ef0f905080a972318a3107b02ccd7ffa2257605
File Path: C:\Windows\System32\unimdmat.dll
MD5: 40aaaf3f6255ba0000069ec6baaff613
SHA1: b96040a7fe70d7649101f101ca581dbc5e5cb6dc
SHA256:c91961564c4265f199cfe872811869fe3875ab1457dac511b442701070a4156a
File Path: C:\Windows\System32\uniplat.dll
MD5: 09ba0665b996fd404b1329cfdea2013e
SHA1: 198533e290a07934b98a34e5e9f88ab054b6e3f3
SHA256:d3218eabcd08e84f7204ed1902f52ae04555a857de2493f4f86f24d335d59439
File Path: C:\Windows\System32\unlodctr.exe
MD5: 789736a4a47609c77df65e2d0f7bc61b
SHA1: 7879de7abfbace22c691f7c05c21a9518c28ddef
SHA256:e8eeac85a29eb75a4cf41509ea982ae1b6256d0c7cdff3299ed3df3ce34356d9
File Path: C:\Windows\System32\unregmp2.exe
MD5: a6fc8ce566dec7c5873cb9d02d7b874e
SHA1: a30040967f75df85a1e3927bdce159b102011a61
SHA256:21f41fea24dddc8a32f902af7b0387a53a745013429d8fd3f5fa6916eadc839d
File Path: C:\Windows\System32\wbem\unsecapp.exe
MD5: 074bc779f1a16a04a92d15c8a42c4fa9
SHA1: aa871ce8fe51cd7ec5af4ac97e462dd613a1c69b
SHA256:8a70e6f48ea1f05ce55cc5473491d344c8c194041f876c5892bfb05e94a9cbdf
File Path: C:\Windows\System32\untfs.dll
MD5: 89d491dc8b5f94affeeb2a933edcf627
SHA1: d6d80a12583b2e0338b8413c921dfd761bf8e784
SHA256:19558baf7b6f8fea601b58b6c9f8ac1e21c6e551e83dbc4de38a05dbfb5ac66d
File Path: C:\Windows\System32\updatecsp.dll
MD5: 40097d38b72d9060f04fd58cf1dcbca6
SHA1: 95aa295c089a529cb5137dc64318278b334b6820
SHA256:c2192013df6081479d95e7baa25df97a54a340a18c980c77359a94d13a4b6fa2
File Path: C:\Windows\System32\updatepolicy.dll
MD5: 9b7d3830627279f81911eeda7d4ef467
SHA1: 09fe98b04fe4aa34010d3a56b90cfb1be50bd676
SHA256:19900d5d36dc84c2c9e900929c24e13a2f488bd7777c87528129c21c25aa996c
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_4a3ae74cfa6c37d6\upe_battery.dll
MD5: 09696f6741474b502c040d489ef618a8
SHA1: 3487f48cd9c0948fb0f34f116627ed95debbfc58
SHA256:18e72a10a939c5a32f9977f04edcab6e1fb76a306a3caa99a0db7e3da2b68755
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\upe_battery.dll
MD5: 80a98a55b91dc7352edc6ec56df9cb10
SHA1: dc54a24162d136ae8efd7a1c1d0591879e8df349
SHA256:2362dbb70a3084d3704d0c1f2828e5260dfb8d8439e037c5cbf51a5db6aed3f4
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\upe_hwpf.dll
MD5: d6f63ca745003340e13b3e49302bde10
SHA1: 3c881f5898d72909783f3dad66bc0bc65970a3a4
SHA256:d3cef5644208b2b9b2bd21f0a9e2e7269193e846eba1812b26ee51f740d5ca7b
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_4a3ae74cfa6c37d6\upe_nvme.dll
MD5: 29e6e1ea678614d79e3291f0d7372db1
SHA1: 82cfbc73784b33893f77853ab8ed64e41074ce23
SHA256:e48bcf33129195af5844a859a92baa2cc6fbd30566bb13bf621efeb01b0a0ea8
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\upe_nvme.dll
MD5: 8fa6d0c29ccd1a92245c51d306a240b4
SHA1: f5deaa9d85587e540437b2bc681035cca5d988a7
SHA256:2e1034056388b5adbf9cbdf92cef89ec101b30ec047985b1c665cd8fc339d41e
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_4a3ae74cfa6c37d6\upe_socwc.dll
MD5: 1a79b29a4b0f4c6ce48c9a1ec03deb38
SHA1: ef4b88c358b167b3776c0ec87c384886bb63f263
SHA256:6c4aa7c80ba8a55491015ddd5d96583e06137fa0fd45e12b996f3830530be911
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\upe_socwc.dll
MD5: 623758af67b00a937576bcd18d8f59e8
SHA1: 290f71d4f71a3099600e5b173500b90bd43d9729
SHA256:16ab254deddcdcbbec0e74b408c9b876a7497bc48a0dc29ff87c3707ac390982
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_4a3ae74cfa6c37d6\upe_wifi.dll
MD5: 95e8a65e7ab41476138adb9fdbda2c18
SHA1: e57ed1acdf68e444c3c10620af67dc2eb768a97b
SHA256:670faa37c4d6b550a0d614ca92b500c7cf47021d66468f7f5b4a53fd6de10b3e
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\upe_wifi.dll
MD5: 5516478ae6819c8c7957a31a33fc33d2
SHA1: 13562c14820404d56c7f30e04db3304c7a8802a5
SHA256:cf9620fabbb3a0ee2b1638b6b2e080b2f4c788f692a1825f89348ab3c3f77e09
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_4a3ae74cfa6c37d6\upe_wwan.dll
MD5: f09a2a89ed1c2afcfd8301c5130a4a9f
SHA1: 522524ec7d268ad1fd764d8f7fc9e5cb07df2f99
SHA256:4d297e610a3bd574e70661936df77cda2965503ce7993f35ea7df662fc3fdbf7
File Path: C:\Windows\System32\DriverStore\FileRepository\dptf_cpu.inf_amd64_82b77f8c4618e2d0\upe_wwan.dll
MD5: 55a458bd8cc494fc28ea00ef09c2b930
SHA1: 607f09782050d2a4caf8916be1d0cd49659d38ab
SHA256:598b54311ed768d88254a0ea1a2a3ad853b56d66b9e9d87dbbe71c9e53f4703d
File Path: C:\Windows\System32\upfc.exe
MD5: 299ea296575ccb9d2c1a779062535d5c
SHA1: 2497169c13b0ba46a6be8a1fe493b250094079b7
SHA256:ee44fe14df89c4e5eaf8398f8fb4823fd910c5a94d913653d6b9e831254f6cc2
File Path: C:\Windows\System32\upnp.dll
MD5: 618d6375c71d53399969e284a737252d
SHA1: 38d59a7c3d2bf57ba5d52947b4c303e4ede368c6
SHA256:e20788a55013589741fd1b4c6b4ea6ae6bb34d6c31f1ab91255adb02a98427bc
File Path: C:\Windows\System32\upnpcont.exe
MD5: 547bf79b9f51c5e8538021f378d20df4
SHA1: 13a7b6cf56aeb4b6fe037ca3b492ff864b81014a
SHA256:03013c8f6de7c61139b89387412b688323a621614e4c89b11674cd4004435bc5
File Path: C:\Windows\System32\upnphost.dll
MD5: 1cbb811d61e26a663bdb41b3dd609cec
SHA1: ec0e8e285b057d1bf1ec570045c454653deb4dde
SHA256:2f18d2adff05de451c26bd1a22cdd7dc8658d720f24bf6877786564e142631c6
File Path: C:\Windows\System32\upshared.dll
MD5: 184176384d6540ac9d7b09c2a136dd28
SHA1: f91b19915384aeb97938166506804a08921dac86
SHA256:0823e3680ba42afa5683fb479c0464719afa9256f9ba9a5ff9e7fab25c4bfb9e
File Path: C:\Windows\System32\ureg.dll
MD5: bedb986db58773000c9570b8be73a435
SHA1: 5d8ec9381b789172936457a85dfc49f3b325476f
SHA256:ba2ce11ae73c7d95f2d40c4b4c185a38c37672928c8609fe613bfb9fca5cc997
File Path: C:\Windows\System32\url.dll
MD5: 3b193173a517524600c63d60fe3c0771
SHA1: afdbf106e79af8ec45a1f0533af86019e59f9614
SHA256:36bb3d6893068ff80cf83772447849f8d2df551280c9ee532e793518e5cf62b5
File Path: C:\Windows\System32\urlmon.dll
MD5: 95620c546f78fdd560a81edcea982af5
SHA1: 6648c733f23753c6b5564b1ef48aa8ca7c657759
SHA256:842a7f8fed8146ea7b04e292a80074a3375f3b2e5fd2e01f890e0658b5dd7a3c
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\urts_internal.dll
MD5: 9d728966f4a5e74173d9f6cb1d33b632
SHA1: ad5bcb2a425667c3e6c403ab6796ef16ce06efc3
SHA256:c7ded5ffd103f999e95f17247336103303c6fc682bd9a4a463cb4a8df51f67fd
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_d372a4ea3b959b1c\urts_internal.dll
MD5: f60fc0b5e495654ae605f4c2dac7798c
SHA1: 6aeb58dab7b02a7f653110242a3d402e84b6f5a0
SHA256:f73128b4f08e34b63636f3540e1d7f8f8e1d6d4f1c221c99b014210c08281bde
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\urts_internal.dll
MD5: 702e35f59f51678762001a2c8b51a250
SHA1: 70b6320bc6690b409c78ad622a86dd493448463a
SHA256:8df7b85177439ae762160d91d8df4cf9d30dcac01faf98aba2ec05dcc61a9a5d
File Path: C:\Windows\System32\usbceip.dll
MD5: 28cf562a754db4d8f434a8a494b28575
SHA1: a7dd2fd0e0174f6e9efcafdd90a4cc87a8324c08
SHA256:03f8a3007a60e1234874d67cdcb4614f2c18a4268df9c42150b4ccd0521b5e1a
File Path: C:\Windows\System32\drivers\UMDF\usbdr.dll
MD5: d1b786482f5df320dcf6b6caab144a09
SHA1: c302a16b1572fe55fa3e4eebf967ecf2e0423210
SHA256:c9873add74a136111de55c14b5c8d69609fe01921358a0183d2dad874d05d2c7
File Path: C:\Windows\System32\usbmon.dll
MD5: aba656cdd1f460251e760be7f86cbe6c
SHA1: 913f5bfeaf01dd41ccd591198408a551024d7418
SHA256:3735b809258813ec992efc910bd4a83d18d55f1da04a5a526126cb633eee2439
File Path: C:\Windows\System32\usbperf.dll
MD5: 1abb49f2ab96dbba56bb7faab4e2bc6e
SHA1: ebe1d31a2dea95ef00a325a67957b4c77fa0012d
SHA256:8ce394c87b7948178ff162f9045d87b37f09443b3b8d9ffd6053aceb836ed044
File Path: C:\Windows\System32\usbui.dll
MD5: 5d3e184b44b6b2a4f88b7a96a8ae4c4a
SHA1: 15192917341ab4337ec71395bc42c74961071ecc
SHA256:7429846740b83557a0125073eb3615029841bbb9ddb157fc252fcf74bd2f0871
File Path: C:\Windows\System32\user32.dll
MD5: 70f007ee4ccb64732fb83dda73a3b467
SHA1: 2edea7dacd6debcb403a413002de0f0a4ccbc729
SHA256:2f791adfbfba32cb70f84fee508264f379ef69b9486dddd00f3a9cd380f53b4a
File Path: C:\Windows\System32\useractivitybroker.dll
MD5: 1e6f6c4b9c114643a646503f507ccb4d
SHA1: 344053ad24525d42b70dc49b984a0f2464517a5b
SHA256:0b459fe6ff1b53812074577da1f059671005c535c3504a221329285b74d6807e
File Path: C:\Windows\System32\usercpl.dll
MD5: 84415771073786752d3a9a46316d4372
SHA1: a9dd61366bdeb10dc8b39424df799b1afe146405
SHA256:3913a1a657e8d071a2459b7f847cc1ca73214672974cd3ec8eff8b492dd59244
File Path: C:\Windows\System32\userenv.dll
MD5: 7e597e43eb42d685dc74535d9d2ef692
SHA1: 05259f9a3a4acea619035c1250c7da138a08d398
SHA256:d0da2e1fd687f1e9ae3bc16483007140356a06c32106660c145c7da854f87566
File Path: C:\Windows\System32\userinit.exe
MD5: 5cdc907c7818fbaa658fc9f2abb238f1
SHA1: 081729b1fdae100a8efabd58e08f8423e1617dbc
SHA256:0043369966e39c40b96c941ebe06ba53139dc314785f0d2d5d490def51dfb86c
File Path: C:\Windows\System32\userinitext.dll
MD5: ad783ac5c5a39534a8dc685af5115f4c
SHA1: 9f22331feaedb8d3f9b51a79d07f2b83b9a8aa16
SHA256:2641276cf4cee0b05d93e8eb575dc59483e09c3f59f6cb7897039a4abed41261
File Path: C:\Windows\System32\usermgr.dll
MD5: 69bad53571250a6d655cb2b775b7d232
SHA1: 3d83a3aee9a21475c3e0abd557d8ba65ee841125
SHA256:c5d25c4838e674ed6a5555135498d26ee105d4c5ff4ce479efa9782ed7467424
File Path: C:\Windows\System32\usermgrcli.dll
MD5: 1caf7fa0ac24e1dae3d6e224868ef99a
SHA1: 4fc94238522b1e1951a001274224bb54045a8140
SHA256:9574c43db014cd973c64163bd7c2ac61b4c297065e94e0a81c4d8f065e38f89c
File Path: C:\Windows\System32\usoapi.dll
MD5: 91e45634632717a467fb9d1e433d68d5
SHA1: e7527b6832687e3c9bc6bf88e6202196937bfb5b
SHA256:4cc105070d0828f916b74a021c9bfcabc8965d39bbb3f7e91cbfeb181f45e7ed
File Path: C:\Windows\System32\usocoreps.dll
MD5: c9dff6190726baae37a9dae1184829f3
SHA1: 52bef61198c5e03f6119b3e1a2766cf9c5216999
SHA256:52c237c4beb2f044777308dfb1020954c3e1167618936df6098da9d7ce5cf3b7
File Path: C:\Windows\System32\usocoreworker.exe
MD5: d0a59fd5643de1b6a84a96c37b126b6a
SHA1: 86ab810d3032125d1844d95b4073ba531a938736
SHA256:f051657e3929207c32512c811a3dfc8b11af594fbf9f13f78cb58638a9ef4af7
File Path: C:\Windows\System32\usosvc.dll
MD5: 91fc7e585be26b2ffd04700a2da51b61
SHA1: f895bffb5d9aa98c5ce135e67d00659c6a9f87b5
SHA256:d05adfd8263d6839b5bace82c3ae2f5370b0f436ad88882125642c6ae4a372e7
File Path: C:\Windows\System32\usp10.dll
MD5: 698b2454b8aa3b364a9977967416c0f7
SHA1: 9fc69de2459b3fbb19f134184c514899b38fd41f
SHA256:749806dceea5635ef7a919046423befa6529009c3e9e91e515a2bff833185944
File Path: C:\Windows\System32\ustprov.dll
MD5: 53ab6a35945f498d7be4dfe3afc8f922
SHA1: 075abd21d99cc090d034663d9cb69e50348cd0e4
SHA256:c72143c38533eb106c87759f937f553d1d5411b456dffe0e41c14d3c7bc796bd
File Path: C:\Windows\System32\utcutil.dll
MD5: efd3569967498572c62d1bebe65acf7b
SHA1: 0b7ac1c4c5785946c27268b0178127c3441aff4e
SHA256:e1914825315743bb92d5a54efd19aae29269813f0528d9b682544b5046b147d7
File Path: C:\Windows\System32\utildll.dll
MD5: d60b3faf21d630ee3e0fa5e8aa72770f
SHA1: f9d4b8e6a36a0059b83319e4d69045a5dc09daa0
SHA256:d48369e760c5fd9809f3a8dd171d91bb524e5b867277e894c7025fecbcfcd935
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\utils.dll
MD5: 8026ec532d83fbc1b140e969794586da
SHA1: 0b6d47ff4e2185c10899a5559eb49c310c983c41
SHA256:f42bb1936d6d8d5115d598224a9bd9dff46b1097c6cf668345554365905e611f
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_d372a4ea3b959b1c\utils.dll
MD5: d2e903f5c4fc119b6dd42f0e7bf78438
SHA1: effc4f5c1f3039ecc0ce30106abfa21c1503eed3
SHA256:638957a0d4c3952c96b2a4b0e925e8fce25eaae863fbe99fd2570bbe1fd685ce
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\utils.dll
MD5: dceade1198733511a9e77d0f9485e9d0
SHA1: 7f62e87f5f5c5644aef74bdeed90bd0734752351
SHA256:441dac120929d720fa82bdd5f02c828cf553f5de252082aae9c46d488d2b4eb3
File Path: C:\Windows\System32\uudf.dll
MD5: 78246bad021085613327f8706913177a
SHA1: 9707f23b59a0c4f3461ab2e89fa87561316d3d9f
SHA256:77e7af495a1e30f26616dd2e4c93ddb0d177c91e35d5c8f92eb535a54a237aee
File Path: C:\Windows\System32\uwfcfgmgmt.dll
MD5: aac430a15d1196398fde36fff9bd9950
SHA1: 387c500e166549e0147a209cf52879a7ed210968
SHA256:9d36150457c658f741fc482008089b791aca906b821ebd959e16ad9e1cf52e36
File Path: C:\Windows\System32\uwfcsp.dll
MD5: 76486115be3b989fbfae817eeafcf061
SHA1: 4000e7010bc6967555a3ae86ef665e8f4adf4771
SHA256:7422a2bbbc67b4d9aabaca4a6ca2dd47286da53deb92cc099a1e6968e244d7f8
File Path: C:\Windows\System32\uwfservicingapi.dll
MD5: 0dff6432cb0c184ca0c7f3793d1606dc
SHA1: 89828a8e2018b1b28b1b2899a9bc7afebeb20407
SHA256:a0dec4740c63e05c62206302883bf1cad43fba18483fd88c590c0ca216454861
File Path: C:\Windows\System32\uxlib.dll
MD5: 391fbbad1647a64cad0d0536e3e5c6f2
SHA1: 5d62340572b442aa3da864a1048573a38d8d9b5f
SHA256:a2cd994d606f3e7f05d2ef42725386ecaf80d12cf38ea6039a8e1e0a6c032278
File Path: C:\Windows\System32\uxlibres.dll
MD5: f8a9a89e042d141ad521a9ca4b072824
SHA1: 48d3595c92ce291cdc878f035da8be28619652ac
SHA256:aaac047292953d4dbfcf33c2c379fa4603e3bf50a10f74c6b189842ecd460717
File Path: C:\Windows\System32\uxtheme.dll
MD5: 3a06846e4d484d7e1b8544f0908cf78b
SHA1: cbd45c947320cdb2db3b8938f4fbea80b9b95ee1
SHA256:d1ff2c49e692cce061d33b43798aa909c14cc86a549a5da27fe87fdf40129d3c
File Path: C:\Windows\System32\vac.dll
MD5: b076bb4da2c90488cf86d3ddb3c12344
SHA1: ee7ba3a34e506a53ac73507ad484d09cbcf97653
SHA256:b94e8cc7c168f79ef9e06632be794201a39345f249a89c54433bbf00b28ca1e5
File Path: C:\Windows\System32\vaultcli.dll
MD5: 8a424fecb5ea264fc2ae39529f48ec7e
SHA1: 42276f4d1e506e57cb415918f988d6deae027ec0
SHA256:210551b7c96b177ae43d918d31407ff650c1dbb8045bce3457341e97e130f68c
File Path: C:\Windows\System32\vaultsvc.dll
MD5: 14b3b6207f7eaa244a38952618e1e08a
SHA1: 0edd8dc40c2b9eba8d9977b0e8ae757decaadfa0
SHA256:44218082ec5958190ee1296ce89f5ce60ae5b4de4626d2ea36e9fbdfaad4ef75
File Path: C:\Windows\System32\vbsapi.dll
MD5: d236b30b6b9b70537750d1b925614446
SHA1: a190a1c23303d27715b88636b82eeb7f6ba6d364
SHA256:97daba30674bc5ea759187650fb9c2121755d643bb56ce816243ad31e8eacaf8
File Path: C:\Windows\System32\vbscript.dll
MD5: 06878ca96db3fcf249d9c584adea1585
SHA1: 7aa00cd398e2b57e0133de5ad083c14afa2d8259
SHA256:35de1b21e2aa10c7655301d69f6ec6db01eb0b2f55de16e2395ec64bbf9f0fc2
File Path: C:\Windows\System32\vbssysprep.dll
MD5: bd19e53b7e2a4a3d3203caa43362a0d0
SHA1: e78a13a66ff535cfce341bd6a0e767ce40401f0e
SHA256:12e0b45816fb08ce4faeb24fe125c465e382180686c31809da4c305f595ecb22
File Path: C:\Windows\System32\vcamp110.dll
MD5: 0ab01b9ae2193fa1f3c25da163db5f36
SHA1: 38d6fba7d32d3c633efb5cf5c5902ede7372384a
SHA256:b26ddd1aeaf3f81edcc5a55a1938357a466ea2b0652560c4999faa92960f6190
File Path: C:\Windows\System32\vcamp120.dll
MD5: 182b2aa59f75b2a6f74e7b518e3d8383
SHA1: 32ea5a8b93187c39fbe5fc0d362b625c74a468d6
SHA256:ef3f1a0fa0aba642a4735e99814e7a218fb1d43e0cddc90ce63c62486bf5d384
File Path: C:\Windows\System32\vcamp140.dll
MD5: a9861e8a54e1e870d6f42155f3917826
SHA1: 13fb3cbb94ce078e6b11a96a5dc32e7af1a01dc6
SHA256:96d50de154d1f77c32d5e451ff540bba98dfa321e0d3ab7171427c411de95086
File Path: C:\Windows\System32\vcamp140d.dll
MD5: 38d55e1cdbefac0302b22164b7632d15
SHA1: e86cccd2ccdd42e4b1c434d5de7704a533929e37
SHA256:e093b1c18ad4e19463c8da1964f4d376c2fc978271bdfceae6255de5de79d025
File Path: C:\Windows\System32\vccorlib110.dll
MD5: 2aeb4f8e2bd49fa46e7fca142a1003a8
SHA1: 64c1a86155fce5c2d0612ff6e88f625406103835
SHA256:f5f635c0cf8252b81c8283ae7063e5bdbc7d608ee8798ec6064707b489339d5d
File Path: C:\Windows\System32\vccorlib120.dll
MD5: 3f169d9e926431feca3273cba36648fb
SHA1: 86826d400451cefdf863f6f5ba41bec746de230f
SHA256:2ccb42f7ceb97ef01fd5ace69667a219fa22fc9e249cbf277194a529aec44cac
File Path: C:\Windows\System32\vccorlib140.dll
MD5: 5ab008136384b6978c3ad252c23e5d6a
SHA1: dae1edd72d8262e70821461b20b79a05a38774a8
SHA256:85d54f7374f6e77e83c4fa79de61e2f0aa5f8ae4184bb20cf96d1ad378d1a057
File Path: C:\Windows\System32\vccorlib140d.dll
MD5: fe7e9819cfb68d0098fd9ddd6b7ac15e
SHA1: 47a8dd62517c1653a8c14568532c2b6575013deb
SHA256:61e6ec74c86e209dc13e292190092d21eafead3b43ebb9af30180618ebe4bb87
File Path: C:\Windows\System32\vcomp100.dll
MD5: 3b66b408ff3af1ccb25e096aba23611a
SHA1: fef88436f6ec339623f311df83507b965d0324fd
SHA256:67c5d600c0564dd201377fd06bc1a4b07befdfd30cf7fa410bd5b5c16d5d2ce4
File Path: C:\Windows\System32\vcomp110.dll
MD5: 2d73b9301db9798bd740ed393c13b9e2
SHA1: 6b43b30aca5cbddb636b35ff4c6a7fa6830666c2
SHA256:30dbc138c12eca9cd0721c2208fd8c657090ac39b1cb7d20f1aa19935cdd946d
File Path: C:\Windows\System32\vcomp120.dll
MD5: fd7f0d239e2227244f10e309c322e167
SHA1: 1f8c667df810fed8fb42a6680a15465ac1e288eb
SHA256:ae710d6670d922fbbf0adcbec743fe75e572cf21cf7579faf5f347a606c37cbb
File Path: C:\Windows\System32\vcomp140.dll
MD5: 7a01fdcb91fea02150712254ce35ffde
SHA1: a3f36c1462598ec7f6762ba63bc3870930c7b7f8
SHA256:c8b18495cc9e4d9f3c01350c4ec14695e207dda2b9d4e730c532e093e1512a27
File Path: C:\Windows\System32\vcomp140d.dll
MD5: 3e62f138547e448ad7d3dfda70388ff3
SHA1: fa2bb34a9b416a337e1f51b0f5f16b728dd5259a
SHA256:9a5ac1e035af187d35f94ce0de5f3f198a667799c0719ebbbf032cf20a689812
File Path: C:\Windows\System32\DriverStore\FileRepository\iclsclient.inf_amd64_75ffca5eec865b4b\lib\vcruntime140.dll
MD5: a8b2fe18df264913fb58bd521efdeb5e
SHA1: 6187d81ab14e46e0613a23bde041bfac798187f0
SHA256:aeff6867f848cbf5777398a9f56ba42ccfdd561cf881ecdee309905e551f8283
File Path: C:\Windows\System32\DriverStore\FileRepository\iclsclient.inf_amd64_e936ad8266d026ce\lib\vcruntime140.dll
MD5: 0e8f593b3f55e44acb8991fe9c340491
SHA1: a945ec6dc4efee8514090f2c9720c0d86a5abd57
SHA256:9c6859860ba1a33f92766da3e020bb781b559a24dda42ae87b320e5ad75dd0e3
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_01d078da8c0f4900\vcruntime140.dll
MD5: 6f28982952c77b86051fef5b61b79d83
SHA1: 5ceedb6f0a8ff98aef78ee6ad4a1b4c0d07cb54f
SHA256:a170317d6ea891696b1602068841f0a8ac4e3696b7777393f8ab8fbed67287d9
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\vcruntime140.dll
MD5: 76f01bcc9e32e6928d03785471591618
SHA1: fa507872e6545f19bdf1d2a25245e1d0e696d380
SHA256:c695c787874976b03f2aaf204f03bea0dcab3c97418b1c7e2b2e9fb0991796b8
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_fdde6ecd49c3a98b\vcruntime140.dll
MD5: 4df06602a3fdbd0b13bc1646bb47d507
SHA1: 72e1af525723abed6ad360410afb0403e37b24d7
SHA256:2e76cb80417bd5f7fb61684e62741f5fd4f8a21a0a8c80ba30d72e378261bd27
File Path: C:\Windows\System32\vcruntime140.dll
MD5: 4585a96cc4eef6aafd5e27ea09147dc6
SHA1: 489cfff1b19abbec98fda26ac8958005e88dd0cb
SHA256:a8f950b4357ec12cfccddc9094cca56a3d5244b95e09ea6e9a746489f2d58736
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_01d078da8c0f4900\vcruntime140_1.dll
MD5: 16b92602196883967acd1c476cd3f7bd
SHA1: c6be9cba2dfbdb0a35b8f4065cf9cb272d3f74e5
SHA256:23054b509e79b4512f11820217fda32baa16865c6957de0886f20b2470aac793
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_7d126bda2f653af7\vcruntime140_1.dll
MD5: 07796b082acc7f19d38b05320d9d8ad0
SHA1: 91647f41c73df3e4d38634ad97164f8b27967eb7
SHA256:5e4a1bb91b2bcea3e0743e756919b8a9d04eb61ee542cdd767bf00b2006bee47
File Path: C:\Windows\System32\DriverStore\FileRepository\lenovofnandfunctionkeys.inf_amd64_fdde6ecd49c3a98b\vcruntime140_1.dll
MD5: b9d824d50e535a37b97bc8dd9dec4294
SHA1: 20d3480bcf5a449afe33b9d5758fa800412073e9
SHA256:ca8d8fa4a178d201d7f0fdf608b621522719816a627d88cc3ab8aabbe8084f57
File Path: C:\Windows\System32\vcruntime140_1.dll
MD5: 7e668ab8a78bd0118b94978d154c85bc
SHA1: dbac42a02a8d50639805174afd21d45f3c56e3a0
SHA256:e4b533a94e02c574780e4b333fcf0889f65ed00d39e32c0fbbda2116f185873f
File Path: C:\Windows\System32\vcruntime140_1_clr0400.dll
MD5: d700512821d0095da8a9e7b6da106bd9
SHA1: 213ed334c610e589fcaab65a8b5427effbb28aa3
SHA256:b25ec2affbefc2b2009502f7445625df9e8aeb16c3e56e4c816946049396c320
File Path: C:\Windows\System32\vcruntime140_1d.dll
MD5: 5191be747294505dbd536d276470f3bd
SHA1: fae71174d70515c2819d325b7a6baa9e38a59cee
SHA256:fbee44731682df813bb36d3006a44b7c61bdc2178f35f11c1c91b320a108d9b0
File Path: C:\Windows\System32\vcruntime140_clr0400.dll
MD5: 006520d546d4e15378b11b1d269559e4
SHA1: 2b5a4b93c98cf1cb8dd5e337f5efda83bb928a25
SHA256:7fc846abd97d7112d6cd1973d5c9f250331a1413a57a1e1456ae55308ca843c0
File Path: C:\Windows\System32\vcruntime140d.dll
MD5: d3a035156204a412e8e69d7f8bcdc838
SHA1: d5a77b1c62822d47b4bee8db1e84ddc1b3666c15
SHA256:20c41bc8d9f9562896485e794434fa82f732e15b3ff81b59ded4b6a1e0d5781b
File Path: C:\Windows\System32\vds.exe
MD5: 339affe7ae482dbe7e1e0f5d044e0fda
SHA1: 3284624adae70a305ed1ff5902986babe925d5c5
SHA256:614123ae67b22b0b83eec1ff6d46469f6ea20f2dca051e7e4b002ebb33b62aee
File Path: C:\Windows\System32\vds_ps.dll
MD5: 22e9d31c65bdba1c804d4852289a7d4d
SHA1: 8a639e49d74d452877b5767e0025dbc6ea349b67
SHA256:d9f138f6d11bcbe624932bc64c53a22840f4d98936a49cf8354ee475ee7f26a9
File Path: C:\Windows\System32\vdsbas.dll
MD5: b2131be71c80160b6c96275d58ae9899
SHA1: e474b1c72f956280e3c24692b54abd70e3f1d147
SHA256:a00c45130f75406929624a9e210cb448266de2dcc359b5c58844836df13dbd1f
File Path: C:\Windows\System32\vdsdyn.dll
MD5: 7e828e37530fd6f7bc653b744aa0e162
SHA1: e747528ecf6a77cfc63fc6c9b7516255bb68188c
SHA256:2f5d4bdf93e21b7f83172bf0081e8cbc11f18b0708513e34a3f87d4b8f2925c9
File Path: C:\Windows\System32\vdsldr.exe
MD5: 04937965d768bf16fe3ecdd4c62aaf05
SHA1: b1b4ed42a2c433e89ec7878a09d6f544a2ad3b4a
SHA256:b77dd867f616aea1219472f0aff3d14f75562d10eee7e0817f4508fd11717fd9
File Path: C:\Windows\System32\vdsutil.dll
MD5: 2aa1f111519854da3e0e5fc8caeec6ad
SHA1: 78e4e65d9623bea1441a182356d00c8944677953
SHA256:bcab1aa32ac18956c540cb27f913093da6627684c9a35e424ef53e4bddc45b93
File Path: C:\Windows\System32\vdsvd.dll
MD5: 022d18d9f1ac086a05e1e3d47704f242
SHA1: 2b6418dcc127c2039f4c2b8c3218b84b7ef3065f
SHA256:cad44b8a0356eadd9db73c0d158b08d8d518940d0568841388095255fbba1f70
File Path: C:\Windows\System32\wbem\vdswmi.dll
MD5: d12ae3960d5edcf0f9792f28689973e2
SHA1: 9ce2f9ec42c138d6c18befd71602c891e5b3b741
SHA256:747d1d9cf72ba6e401e7795c5a6d7c90dd33c7d3bbbee91ddeeef3b7a45752bb
File Path: C:\Windows\System32\verclsid.exe
MD5: 81d41e225b8b55748ffb0d8747fe8bac
SHA1: b8359399f1751ff1affc4a3a9f90f890cb17c9ed
SHA256:ac6e1f614cb902c0abe4297646e21c70590624b652a080bfbb8407b1ab52609d
File Path: C:\Windows\System32\verifier.dll
MD5: adf0f2f7ab69b71e73895fd23949b318
SHA1: ffd20ff94c647d49513d0abb24415e3d72c6babf
SHA256:c1228eb181ac5fc2b6f8404404d6c5e04d78d7c85c4502d1453ead4616f21a28
File Path: C:\Windows\System32\verifier.exe
MD5: 2116190ae866163ed485c4fd3e13d03b
SHA1: 664654a40696f13dc8e23bd2df32ba55a6e0da20
SHA256:608af8aef15ba4f75996d46249a428ebbff1551de06f6eb6a053c2c330da6965
File Path: C:\Windows\System32\verifiergui.exe
MD5: 03a76a765abe56c8999a548331f191d9
SHA1: 37d5323cc065638d06c29e8a4239dc0fae072a5d
SHA256:19a383a3028816c56ab123962707adda9d3f68091c44f9d9e2f69e6ca935f151
File Path: C:\Windows\System32\version.dll
MD5: ee901ff4ad552d0f8dc8fd5837ace5ab
SHA1: 699cf845d7320c0a7c1407dbf8f73c9fdfb5c754
SHA256:af45a728552ccfdcd9435c40ace60a9354d7c1b52abf507a2f1cb371dada4fde
File Path: C:\Windows\System32\vertdll.dll
MD5: d155e3f231202fa61b73afa07b3089d2
SHA1: 24c8ec8e10a9e44ad03ba16a8732513d7e77d657
SHA256:6251247afbece1d7d3bf351a2646409649fbd29842ec63bbe6724e02dccdc007
File Path: C:\Windows\System32\vfbasics.dll
MD5: 19e124e99ea7e7271636d7772332d3a1
SHA1: 4d376968cfa3196afda911087e5cb16dc21b440c
SHA256:10212c1de3b0c5c9c9a70af896654151bd6e58fb81f11c105b2f502b64c5bbbf
File Path: C:\Windows\System32\vfcompat.dll
MD5: 2edc90f6eb2af1624f281a06d22bf95a
SHA1: a065178f1a57ac840706b77c75b846695f1d1a20
SHA256:045f4896498fea1537631a1f62e7f441748582f0132c16f61e73bb38534f0876
File Path: C:\Windows\System32\vfcuzz.dll
MD5: 627665d8751fdccea365a274810fed2b
SHA1: 526e4a7cf9e1a379c787875ff7087c88374e20af
SHA256:357e087f11c9328424554892cce92b310210d39d7c4822ed33b59e4d9c14e02f
File Path: C:\Windows\System32\vfluapriv.dll
MD5: 1bfb88f17793778f42e31804d1d37223
SHA1: fffd10435aee60bb5ae7bd4670f67feadc7ec55f
SHA256:0d751ada322c8b2fb7a375b480f1004aa2fe1b5dacacc88cb06784b942ecfd6d
File Path: C:\Windows\System32\vfnet.dll
MD5: 3db630b837cb1b87b52e3471e7463741
SHA1: 92e8f5a0cf8876913c26291be980d5d8c2c5ab40
SHA256:e217ff42d35d5b590a65242d09bd67eb5b443e41787b555840feb65d30151706
File Path: C:\Windows\System32\vfntlmless.dll
MD5: a3444080debd449b4f726f439c53e394
SHA1: 05570b4139c5ffd9ea9636c82e419492cf714b30
SHA256:63ee56d79f97bd9eff8700af81051d6d54aa009b33fbc0880f7422225a96b1a3
File Path: C:\Windows\System32\vfnws.dll
MD5: b662cfc4114edc779c1b42f6f071ef76
SHA1: 8df32c035fb177e9683ff7772aaa82f70c916c56
SHA256:33e83c998270fc67ce25f513c5c02c3fe0bfc3f197326d2bc4aa6e9f60b6180a
File Path: C:\Windows\System32\vfpapi.dll
MD5: 65032fd7cfee507220b7c3a33da23a9a
SHA1: 2d405a9c4bc69867f85b81918c3c74599fe717ac
SHA256:63fd5a127602fed684366347b8b77b626b37cbb9fa17a6c152519213a9b6fb43
File Path: C:\Windows\System32\vfpctrl.exe
MD5: 4888aeb3036a0af8c279bd8f0da43280
SHA1: 0e14eb3090c49bbd10754a15ab11b8dd6ee39771
SHA256:b607c59e033d59d1c144c8ba831720a9f12194f27dbdfbd7b0d5aed77baabd3f
File Path: C:\Windows\System32\vfprint.dll
MD5: 46147fb19a1d6f1a0c35eda71490aaa4
SHA1: 5beea13afbda64e22f240ad96093b897b4d31ed4
SHA256:924d43dbbb6da8062692afa1b147056dad46a17af4097aa880f8b64a61139843
File Path: C:\Windows\System32\vfprintpthelper.dll
MD5: 2c44a873cb8b0b67c6d2c101053b1deb
SHA1: 23d5f20edf5e93cd18ffc430991c8eef90499ec1
SHA256:094dc9ec443629c1081f225a82703836d490c7ba3d850695c02363c1bd9e15fa
File Path: C:\Windows\System32\vfrdvcompat.dll
MD5: b30c9f165e6164d1ab10cc64b987eac7
SHA1: 46f9793676bf0653cb0213e87bd88d4d467869c5
SHA256:ae4cd7196e441c6efa3b7072defcbfc01642835e6b779f528c1489edb31e80cb
File Path: C:\Windows\System32\vfuprov.dll
MD5: 620eaa4be5cd19f94c59d11eb2ba7db7
SHA1: 789f67f8c4133ba68d6d1a776bda42f1ce18aee5
SHA256:1fd20b9a97a060edf5dc7be8ba39d3e4589f434173d253b578157d161198496a
File Path: C:\Windows\System32\vfwwdm32.dll
MD5: 7c0bf60d1071e5af8fd3cfb8c8334df4
SHA1: 5dfe087df330af398cfd20e7a9916fee58e5da41
SHA256:ebb1272a69ce09dc5f9c6a98c90dd8bd603daafdfe7be59d11c72c45a6d2e6f6
File Path: C:\Windows\System32\vid.dll
MD5: 0a0b91acf22ccbb17985daa918770ce5
SHA1: c83a787cc1b0e7ad48d8f9c94c0f262d7d3aaf85
SHA256:b09d96414c4bcd165f97808258574d23a91095f273f37ec369df17bfa2b76491
File Path: C:\Windows\System32\wbem\viewprov.dll
MD5: 9c3f9c09ce139ded8a23d55ae7e8c6f7
SHA1: 6c7eb3e7d9fad653cb4c99ffa18d0dae99cddea2
SHA256:b646e0153320351731e0253575934a3625dd56d04d2b85db6c1901cb724e78d7
File Path: C:\Windows\System32\virtdisk.dll
MD5: bd4dffb8e89d265a23a1dffab4f88472
SHA1: 23b74f8449eb2170f91d05faea5376448c7941df
SHA256:6266bdba6a89bb0a6d617eeb9cea98a6131ef7aaf2aba944b0ec02ced7aa587a
File Path: C:\Windows\System32\vmbuspipe.dll
MD5: fc993ae728254cfb4a836319081db2a0
SHA1: cb9d353d113f3f5011663b0501a2d9e68c72c3bc
SHA256:aa223247375c0e72c8edfee297437fb597201f5e9675d6b9bbb7527849138a4f
File Path: C:\Windows\System32\vmbuspiper.dll
MD5: a094d58f2f359ed7022a9cfac1665248
SHA1: 0f2612a835ab68a5d4c5120cefb77315791413df
SHA256:cbefc81e6e91c4383ecb6838f256944096ef6c0c6b9f1320d4fc2c47907e7dad
File Path: C:\Windows\System32\vmbusvdev.dll
MD5: a86dbcf3d4743c09f83081679fa3542e
SHA1: 0f78645c4398e3d55c51e8e2d6123a271fe8bedc
SHA256:a0a87a6447c50ed920ae2e3ee619058082d7f252425db4c52ffabbb7bc987aab
File Path: C:\Windows\System32\vmchipset.dll
MD5: 52c8ac0fca100306e1f7d93d4f434be0
SHA1: aa0bd42fb0565b6515ee9f27d2203f1fb481e657
SHA256:814f85e114e41e152a4f4d2e457c9d094d3d5c0174f11a9ad671c3dbbb55901b
File Path: C:\Windows\System32\vmcompute.dll
MD5: fd223437a2bdc9fba6879efc91d9a537
SHA1: b04617c879edded3203de98a064ae4823dcec308
SHA256:b99346d84803fdf4f824af8041c385ce8cc386726b17b7f14adad910e9c182ef
File Path: C:\Windows\System32\vmcompute.exe
MD5: bd84d9eb4eb590c4fe56773c023ccb8b
SHA1: ceea54b12f30cb82b983d0d82f444ece378533cc
SHA256:b0102d27f58bc8a9770a2a8c2cc7be0ddd1b6528189b6fa5b59a880851c161f5
File Path: C:\Windows\System32\vmcomputeeventlog.dll
MD5: 5f491602f83a06ef66840a15ceac3b17
SHA1: 10b3beb150473991d6a8fc98ef34bdc95d5ade28
SHA256:e7dc306bc6173fad4dca2852fa91924aa55cd8b897617c48db820302ad98ee28
File Path: C:\Windows\System32\vmdevicehost.dll
MD5: ad1c2038365609248900f0cb666b0262
SHA1: 5146c7651f9014a5fc2eac9e6e6ff563df671605
SHA256:1d81e3d738efda50dcef164bb228322fe1f30f604b94bad77e4b55bd3d165328
File Path: C:\Windows\System32\vmdynmem.dll
MD5: ca07174d136907c8258dbf423715c35e
SHA1: 8880f7b8a5311cade1df913f50798237bd47b83d
SHA256:cb31b6be5a51d6ad6d9eafc5bd1c35cf43d7597187a3ca7fcac128887eab6a5b
File Path: C:\Windows\System32\vmflexio.dll
MD5: d4a04b1a8e818e72beabecb3cde808bc
SHA1: 0bb05b8ffada360b923960f09f9c54c672caeeaf
SHA256:58df3bffebfff2cde1c7774c34badd8c467646569a11bb43096ae6c231cd6e6f
File Path: C:\Windows\System32\vmiccore.dll
MD5: 2014a218d4712b48147143a8630c247d
SHA1: 4e9d4988ccb468fc42d32f8f08f58fcc2126d17f
SHA256:1af27773b8ead7471c9e4db200876ca48f7076c5ca025cc8edf9588bf66b7192
File Path: C:\Windows\System32\vmictimeprovider.dll
MD5: ffffd8abc6866bce5f0294f6f533a16c
SHA1: 0227524526cb2234140e81ac72301b6bb1ac031b
SHA256:46f6d221146e41f2ceaac7397ed48a081bcc3666537f24be9e2af72e1e7697d2
File Path: C:\Windows\System32\vmpmem.dll
MD5: 7f644d92dd83c4306aef65da33ca0ce6
SHA1: c374dcf81ed4c85851b919d654e756bc9abcde44
SHA256:5012c04566836e2fdf9e7c029919fa4e124bc9295ff3427bcb9645b071f9219c
File Path: C:\Windows\System32\vmprox.dll
MD5: 5ab6d2ede7cf16bd6cd7154a2918a771
SHA1: 79f3c85cb941b49697eb9ef1be207bd4815725ec
SHA256:e5c38cdc51b9faf479f8ab69a2028f5a66ed08d42a12c9d706ac2dbf12882426
File Path: C:\Windows\System32\vmrdvcore.dll
MD5: fbc0bfec77caad610cb0058f1b3438ef
SHA1: 2191be2131b2b707300b3002ad15137f8274222e
SHA256:ef15a38444cb012c3c4c0b6280e76638a1e4a579517a046c178365833de36101
File Path: C:\Windows\System32\vmserial.dll
MD5: 5ad05eb83f545a489d7ca74a8ebed9e6
SHA1: 0b493738c129962299e49b66d2ba5a9ba556e22d
SHA256:2e8e847b1ed0d3884fc00cf9be4718ba6486cd5243f2f0eed190ee22258d5098
File Path: C:\Windows\System32\vmsif.dll
MD5: 975b11b9ffd1d2d36aca08b1d1e44d5a
SHA1: 6d6bb7f91c56d656924ab3c432dfe8ae7f28376c
SHA256:e5411632943adb53dc934fcd2e7457a235c1899940b13bf2a5ab369e7200b9c5
File Path: C:\Windows\System32\vmsifcore.dll
MD5: 833c082a917bab354b1ee9b1df817672
SHA1: 0c5ffbf1dfabdf7261f7dd86ae8c19dd2cb444b3
SHA256:0843bae4ae1036a8177b8f9eee1672fdb50a95381a53c05ab036c81eeef77ef6
File Path: C:\Windows\System32\vmsifproxystub.dll
MD5: 0bc7e5ed3b87291eba6e3722f03fee3d
SHA1: 67932f5fa8b688f9cec344fa63eee61f0ff2aeec
SHA256:a1c106cb9d8094f4bec243451cd0a177b3cb363f7c87e373b104cb510530448a
File Path: C:\Windows\System32\vmsmb.dll
MD5: 35b180de0f58d3a61deb8b64581051d9
SHA1: 600cef0081ca661acd9d5b1df4157b909917460a
SHA256:23dc146ee52e9216226b5bb27cafd256ee5830d7f18249fcd9225aba54775f0d
File Path: C:\Windows\System32\vmsynthstor.dll
MD5: 897fdd7a3d0534301ca7f0ed73d8f85f
SHA1: 64f9c7120613b86462b3b7509b3e9afbfb5a3ef9
SHA256:4c3479d9130b74b8cfaba5a51657696784c2caab5cd15acc15e0da4935a87dd0
File Path: C:\Windows\System32\vmuidevices.dll
MD5: 7de80766c146ce9c74e63b0cee24ff9f
SHA1: e6e562690946f576c33dda03a50f3a496dff566b
SHA256:8293d085067e24f3186a9faab9e016ad6e733ac5e851b171cbe68d623e572924
File Path: C:\Windows\System32\vmusrv.dll
MD5: 18972df9cb0a0624f5fe9f77f56f92a4
SHA1: 77a0c87f874cc73482c94c790108d8dead8773d4
SHA256:98bca202af1cfbd4f4105824f496bda670c3b8d42a091cf4e7fe6b21022d70f3
File Path: C:\Windows\System32\vmvirtio.dll
MD5: 11057893ee57b6a286b94354842c6f1e
SHA1: e91a0850ca393b1f1dabfe2024effc31a7648c27
SHA256:ea5be0f1b1af3641e771de31996f45dbb8539f02c31638d9724ac0c79999921d
File Path: C:\Windows\System32\vmvpci.dll
MD5: 5dbb418f7284dd6555a2ef4536a09623
SHA1: c03c5949149c929b710af001fd4689924b42f538
SHA256:642ec0b6cd544ef750a4db040f11180ae99d1b5a91358dd31cdb5a2d87f93840
File Path: C:\Windows\System32\vmwp.exe
MD5: 60e3ab11150b7000f10d09cdd5704fe5
SHA1: 6d3572d31ea024afc1232466cc0a0ab866e62be8
SHA256:e6b3fe846c71ab6f8f903160ee5d7d159d3178c7e91f612cf0e3ea135634d900
File Path: C:\Windows\System32\vmwpctrl.dll
MD5: faf3031ee057bd92f8a6a4fc35a4fb4f
SHA1: 09751ba876b9373e795915cce385c1ccdb70e5b8
SHA256:e9744e5e048ffa06f7745f0b1408b0958d8967374f6915471b89bb81fcbfbf9e
File Path: C:\Windows\System32\vmwpevents.dll
MD5: 05a385e70030d3c9dabf31f2f389c02e
SHA1: 7b707708745dead78793c5af639c686cff74ffe4
SHA256:77105c3887d8c59d7c0d6401cb4c01cc341e467e2a90de8f3797b09ffe3a4902
File Path: C:\Windows\System32\vp9fs.dll
MD5: 739188b1d179b22a30bab01cedacbe9b
SHA1: aafe8feed653697343d697fe7ace11ddcd97b951
SHA256:f65e32aef6a0996f45517979ff72ad5c73e54b1fbd621476df3e49f704a0cb01
File Path: C:\Windows\System32\wbem\vpnclientpsprovider.dll
MD5: 038ddb2623f52ec773ee3eb84b9e8154
SHA1: 79f735f07c3eb47ac83af6f5efb95b179af60ba1
SHA256:b41104c82756138b86818ab4ea8bb7bc04a6147cd98be1fe88e69edbdbdd6fa4
File Path: C:\Windows\System32\vpnike.dll
MD5: 3af202126b0a207097c67b35a1cc9ef6
SHA1: 3624f5d95affa1b7cf78f001204b476c207cafad
SHA256:f9bc3e1631741772a705f1f4f0ad8fc16afee6d6e808f6e66ffd3dbeefc1e386
File Path: C:\Windows\System32\vpnikeapi.dll
MD5: 09bc402c236a3592269d319edc8ab7f9
SHA1: 502d259154e19860ef6c51d550fd8987113ebe13
SHA256:04feeb0a43a80f53444722f7629a2b447b8e7d9fb01597cc37a2ab7b3f9b2852
File Path: C:\Windows\System32\vrfcore.dll
MD5: 020c54db2c986d8fd19992fae9535445
SHA1: c2566b9817f6add504a05c5a8bb0407e4d7b7e81
SHA256:12d3db4ef77b349d6e857d0b5802a169bcdc2ead77e5c24d46caf886c19d2a08
File Path: C:\Windows\System32\vscover170.dll
MD5: 85879abdd08ba9f45a03d3d52d99c129
SHA1: fbef2af43649791fabcdbd7ca8b18a60e21a8b6b
SHA256:a4192a8c17b182a824a39d01caed1ee20c5a419120ddfaa7d1a86df546dba6c8
File Path: C:\Windows\System32\vsjitdebugger.exe
MD5: 27db52f8b1c3886dd2db06d89b578146
SHA1: be6f75dbcd68727dfe2095819995b179c9a9006f
SHA256:6b5d05c8017c78568f78e8e84b0465337d7b43a351ed63ac4761c749bb0a3f61
File Path: C:\Windows\System32\1028\vsjitdebuggerui.dll
MD5: b3e1c49f9e5526ba21e76f4043d1ef79
SHA1: 28157ac4f8b394fe8c48e61eb7392cd01b384dfe
SHA256:f43b06c848646447bb9cda9e8b0025647085391eae7c376e789b75815ce90a98
File Path: C:\Windows\System32\1029\vsjitdebuggerui.dll
MD5: bc9297d054315623bf3e4004bd00807f
SHA1: af51b9d81cf3ce68b0d7c3a74644cb65998bce5e
SHA256:3ff88758bf7a7450448026e46c2dd78a9b960e02f2952cea6a8352d978386986
File Path: C:\Windows\System32\1031\vsjitdebuggerui.dll
MD5: 25d830adc5850c3a46422c30d2d20e4f
SHA1: 7ee7496e925ca27544bb796fa98d1b8214ee7f85
SHA256:95af4db0b947ba4f214d05e42daf47064321dc238d8460f4cc32d837a2f4fcf9
File Path: C:\Windows\System32\1033\vsjitdebuggerui.dll
MD5: 5c379bd04161f04a57d69a7e7f24d23b
SHA1: 1b5d3ffe7fc2456404303648b90f27bc7e187a6f
SHA256:a526e4abc265e7848f50de38fd53ef4eb6db41b75b7cf17a2556e4d661bf9a31
File Path: C:\Windows\System32\1036\vsjitdebuggerui.dll
MD5: 8a6b1ca196c64dd616b9e9916698cde7
SHA1: 847970393e2342d39a99cf8e1f662e3212a29e0d
SHA256:9a6538fd3830711f2c5ea2880eef41b36ea088c3fb1765028d5cc9967987490b
File Path: C:\Windows\System32\1040\vsjitdebuggerui.dll
MD5: 0758b4b265514ad4849eaeba44ed1bff
SHA1: 6b31cf8af4be150c0dc34e913f532adc27db6d0e
SHA256:434d1dd507074cb68ba0cceee7120f23750c04f7452a7b65b59855189d962629
File Path: C:\Windows\System32\1041\vsjitdebuggerui.dll
MD5: c8fb5c20b0e14ac34808f95746a8be01
SHA1: 28ceed32eaeb6297f6750471ccfd3e7780a73664
SHA256:1a02494e504047c7e534a68f222eddaf7b9c8b70dc0ca9c637f5ed186c6144b6
File Path: C:\Windows\System32\1042\vsjitdebuggerui.dll
MD5: 952ce78a1ad9bd1ac3293b2ad570ea63
SHA1: b708927c9febb6045396e2ded768a475f5065bd8
SHA256:4e30cae1c3911ec0805b118cd34b9e0e307f8f27972ed47a2930d9489776c929
File Path: C:\Windows\System32\1045\vsjitdebuggerui.dll
MD5: 6de5fac08f709dddf67f7bdb129f0220
SHA1: 93b4d965d63605c73f83b5943667277d2952a8fe
SHA256:d087eac1b9c325455bc367350cf2310359905db5c3d626877974d1ee62d7e2d5
File Path: C:\Windows\System32\1046\vsjitdebuggerui.dll
MD5: 899f5bbdabcdecab08e6dcecb6217320
SHA1: f7745e1e7414a8818e7f3d7a50b4fb0d1931f631
SHA256:537d12e106392eb758889d3369b6a6d1474ee68d95165a36a4f004573aeb2707
File Path: C:\Windows\System32\1049\vsjitdebuggerui.dll
MD5: 1e27665b537c64a62f1461602d394dab
SHA1: 5dae13a8136f284d2ab7eb5acc1707c6ebed3bc9
SHA256:89372703c4863c42972e372233a267e935c7909e71a6e0ac02c787f02d7835c4
File Path: C:\Windows\System32\1055\vsjitdebuggerui.dll
MD5: 4e8ae95d7502b2f6f30c2adb1501a344
SHA1: 530bf5d6691a5f39d12dffa1e916a24f935fb412
SHA256:9e054716836644cb3387b5d835c392dbf2aaa442e293bce8318e39e87207edb9
File Path: C:\Windows\System32\2052\vsjitdebuggerui.dll
MD5: 836b55ded553867e3c9017d92a1f6433
SHA1: e35d32b5a8ff4cd884530d6bc229fa41b921504f
SHA256:9e0d05ebeab14b9833f20f4049a91f97911a594e9333766bfb1b99b8331dee31
File Path: C:\Windows\System32\3082\vsjitdebuggerui.dll
MD5: f67bc0ddb2a231a9a736a8f04d8d78c7
SHA1: 3c45106fd8859cc5534966d071211a49cd58e504
SHA256:ff749c8911eae5d4b26198951c49cf9ade3b7026ca017f409f8db77cf1727cc2
File Path: C:\Windows\System32\vss_ps.dll
MD5: 91c8c7b2dcc161873dea8c7e969eda5f
SHA1: d3ef6513a227a58cfaf3053b7bd683984f4382ea
SHA256:e92895053efa7ff73ac30f72b6a12f5670a1dcf1d3f550de9383dca4465ee573
File Path: C:\Windows\System32\vssadmin.exe
MD5: b58073db8892b67a672906c9358020ec
SHA1: aafe91bdc580260e4ef7fabc6b273ff0ae1e703f
SHA256:8c1fabcc2196e4d096b7d155837c5f699ad7f55edbf84571e4f8e03500b7a8b0
File Path: C:\Windows\System32\vssapi.dll
MD5: be145726f90a45bf5fd7e421182cae04
SHA1: 704daad975a33548edfd8e4df8ab56b062422254
SHA256:8ef41d7a63c3e835d3c987368b1b8594284698b5b3e1db374ee0d828897c384f
File Path: C:\Windows\System32\vsstrace.dll
MD5: 91eb5a566ae8a043c03bce73ff463cd1
SHA1: 3c37c4ee88313287fb46d95c8c9016a7d1b9bf74
SHA256:b4c9ec87a871382b3447c7906ff266d8daecbd812db65387b1e01d0a6c0d4a6d
File Path: C:\Windows\System32\wbem\vsswmi.dll
MD5: a2bacf85b28ba2763178bfcf4fed10b9
SHA1: f515141545c1e401942484665e748ce520e792b5
SHA256:13cf26c18ebc61c01f32571c51a8e225b976125c477ed5c3eefc7c634f0a2a44
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\vulkan-1-32.dll
MD5: e67566ad77cf9278c1f7318de719247e
SHA1: 9105225c7425730683681c14108efd8106a35cb5
SHA256:c39aafd9fd117d03a90b178c7503b97b5a0a3bd46e86f290c7d08d4f1780d75d
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\vulkan-1-64.dll
MD5: 591373f6b5daa63756a1418d7e460f57
SHA1: 4359bccdf903713fe4319f53a7780a259f3f912a
SHA256:bf08dffa47bc59c1ae177362aadba7f0b3d8e4ce80d1f1b5872fd65d85674006
File Path: C:\Windows\System32\vulkan-1-999-0-0-0.dll
MD5: c7b2a6baaf4aaa212a365a8fef1a2189
SHA1: 819e2cf4255501bd2632f051832cc8b20056afaf
SHA256:8fe7cfb7af19ae22e839e1ed3dc54218f4343c2753b1ed3d20cc9dcfaa18c2bb
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\vulkan-1-x86.dll
MD5: 82e444512c83c379c2d3493f402f2980
SHA1: f7fbb23343034d613c1a89c2a70a7dda1a81cf26
SHA256:04c19157929beb334e09c980602964c3a931d667613f38ce02dea3a513e74bf7
File Path: C:\Windows\System32\vulkaninfo-1-999-0-0-0.exe
MD5: 790c951eb0049fcf3cdde196069afaa5
SHA1: 8bd72bc46eebc8fdef81d3ffcf6af05534c6a947
SHA256:5f588a31a71e9e0f63d63334641695c87a58961c26b1d4718e19fc40d1d63e7e
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\vulkaninfo-32.exe
MD5: 7859dc2aa9178f3275a53c1ebbe5739b
SHA1: 2c37eed4d97de3111acd4a83bc1a003207e36c47
SHA256:91a3b1f62a6163fb9349b6d58c57c901f706b6d3ca8479c4c397d9c5a2ab2ef6
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\vulkaninfo-64.exe
MD5: cbb7f9e42d85a899eb207cbc4e889d5b
SHA1: 856e834defff12af4918f722b0bac1a774bdb01c
SHA256:087b72c4a46cf758b93f17ae1cce10c858c0ecd991f2943e0a12702107b60ce2
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\vulkaninfo-x86.exe
MD5: b910efe234927cbcad7ba09e1f4dd85c
SHA1: 01934afa9cd0096b84c0835353070871c0144697
SHA256:eff82c98245c607e4f41105e5efeb6269ad1265a373e6639ca7f6b8ed62def63
File Path: C:\Windows\System32\w32time.dll
MD5: 1c56c515c3b64a0e78b8fd4b1546593a
SHA1: c0c01ccc7d99e5213459ecedbbf7bbc96ed997d7
SHA256:6f165920204d27cd4e8a9a593bec2b2efd10ea347720e317f9e1ab31a0946b45
File Path: C:\Windows\System32\w32tm.exe
MD5: 81a82132737224d324a3e8da993e2fb5
SHA1: ef9f88fe8e2bcd8086860092bfb45bc58e9726ee
SHA256:88f14176c848adce732fe1db67c2d95cd495ac71caed5d137e0108332509042f
File Path: C:\Windows\System32\w32topl.dll
MD5: 0b16a06244f425df25feabc318003ace
SHA1: 733898e3bbcee83e508537ea1a1c92c0c57b7a19
SHA256:fb64e733809544d7c3eff3857f47193155a370a65bf54e3d43f991b87c567f55
File Path: C:\Windows\System32\waitfor.exe
MD5: 65f95b6f9a894116af21d19a8cf54c34
SHA1: 97f016a385fc4d533ae46f7f7c98a91b175934c3
SHA256:1ed4bdfbbe7e27856d1b3d6d743efab72e5727bae7b6c02492f8890c97ae602f
File Path: C:\Windows\System32\wavemsp.dll
MD5: 9f8f90c5919539c2d08822e8bb6f2699
SHA1: f6f6dc99b9c7bc8040bedbe1ad68625d405db446
SHA256:98a24a5728276e2ef74fd5c0a9d4f9c90a74597742672932c4e5d94162f4e1d7
File Path: C:\Windows\System32\wbadmin.exe
MD5: 151feeff52d82bfb150b80f852dc7b50
SHA1: afc20feeddd3ddd2349f3251ee03786be280d051
SHA256:94235bd6d75b2b11243f47d7ea2b5958433ccde58368c2c9f1b14226e68867f6
File Path: C:\Windows\System32\wbem\wbemcntl.dll
MD5: a0c78b5fd2b0ea95c52670a4826808b3
SHA1: aa347e947727034942ef61c707a99f582e4536bf
SHA256:7805863d1340ffef571d83f5d9ff2b5a18e0b0e3c407cc8eb39facdb2d70fefb
File Path: C:\Windows\System32\wbemcomn.dll
MD5: 410de26300e72548d5e373717237c7a2
SHA1: d910c7f6d87e0d3ca781d5d68f949077632dda57
SHA256:cc4ac514629c8b240c5915d0068e13367665c635ef6bf0c7fe39fb76bbd025dd
File Path: C:\Windows\System32\wbem\wbemcons.dll
MD5: 165004875959ca2c2e72f4a81b1353ee
SHA1: e6bac753201c380a36d17e3fa4bbb90133d20ad9
SHA256:d5e85e09723063f643f1057b6b07a5899b2df1eb84bec94c39f383cb43b6e6a5
File Path: C:\Windows\System32\wbem\wbemcore.dll
MD5: 97c009c0f39f07e845f8aa615f338b36
SHA1: dc1b5c3297b25fcc2baf880b2fdbeb648921b909
SHA256:16367faec54ee0cbdc40e4d5f43660a9e9317838e1982d1f6ca5083acb43c5dd
File Path: C:\Windows\System32\wbem\wbemdisp.dll
MD5: 756df8beaf018e982e2383702d905729
SHA1: 52d825876f257692538bf9950c07d7f38786a60a
SHA256:59f90d11bd50cad4617151baea43bcf878cadc5fb0da5d07f461b2c2657b9ee1
File Path: C:\Windows\System32\wbem\wbemess.dll
MD5: dbc3853c980c44d89e63df0c760fd75f
SHA1: a9c040d7ace1113df4db85fcd92669bdd5535239
SHA256:331708bf8b09e72bf158ce782724ebe448cad19f47be0918a531c4950f0c933d
File Path: C:\Windows\System32\wbem\wbemprox.dll
MD5: 1832ca8a412ceeb7c772b0c356293ab2
SHA1: def3875adcb26702ddec368a019df9a9f01858a6
SHA256:7ba716740c6459e11c154a7b823037ce1f309cd0fac5e44081aefdbf795f32f6
File Path: C:\Windows\System32\wbem\wbemsvc.dll
MD5: cfe64b7918528dc98b40b4017f11d102
SHA1: e1e0f6d3a31986f735d82ba566b230d2404cf95d
SHA256:c900beb6b1d136924fe32b3f183ad5ac4ccde98bd153bb4ee87ce086e5322f34
File Path: C:\Windows\System32\wbem\wbemtest.exe
MD5: 0be7ed026aa1220de3c2f099983e35ca
SHA1: c6218d1101f9bc639e193f98edc0428d322e11fb
SHA256:2828d06fe31d1d3a1910dc4f370ca652f10cb0f8c83cd0ccdec1f72a1469ddb9
File Path: C:\Windows\System32\wbengine.exe
MD5: 2cbe24c6123e2e793830cbf1bec22b37
SHA1: 4ea7c6e0ddbe25d35f6685899c2d0d8fa218314e
SHA256:7a93b3af6232a8ec599b232df2d079dff6331c39dfc4182066079354de81fc47
File Path: C:\Windows\System32\wbiosrvc.dll
MD5: c14811b24ad1f55101a8c40e5a7b167f
SHA1: 69f3afa219687f92955eed6994d67ebb2b0969d6
SHA256:84b6ca9e7880434964ef75f94a63b0302cadc7a9c82158f1f9a031af1f494045
File Path: C:\Windows\System32\wc_storage.dll
MD5: fd641947db37b9836d02cfe392e6acb7
SHA1: 4dd1a9912dc49bed58f16296ddd430e07a01d5e3
SHA256:0e72694a323fde5b0438e2da284396c178a702378c827529bb2bf58b53830031
File Path: C:\Windows\System32\wci.dll
MD5: 59b5277c11fe527fa05d922a92b6a6fe
SHA1: 2544ba869bb7ba1071ad2fce3e7d3f50b6983b16
SHA256:c1760e8b198b9c343138f0f7741ece1e895fbe3ebf9d2553026d1692b822809b
File Path: C:\Windows\System32\wcimage.dll
MD5: 8fd662242ccd1aebe24674937eb0501f
SHA1: a11671dac1097934c4f8258326aa6b9c2c12fb65
SHA256:bf2bde1b48d88dd8925d005e48efdc6a0c1e2cc611505c595310241ecd95a92b
File Path: C:\Windows\System32\wcmapi.dll
MD5: ede01eaadf617e2812e3310efe898fd8
SHA1: 4207767f3f1b3e1cf9c0b9990a5f31b0c13267ad
SHA256:f19f5d9d1334cb2241d80da4e103c12b19da19a07cb9a7b8bd9bbe57e7eef9b2
File Path: C:\Windows\System32\wcmcsp.dll
MD5: d83fbf12a2f1033ef4e854b5704c9df0
SHA1: d470e4010b01d612f5780ee7ece34b71084f94c5
SHA256:e77851f2a0e2e147565f4227724a471275b9dd17fb97663bc32007196c755324
File Path: C:\Windows\System32\wcmsvc.dll
MD5: 0a7bf5077ed40efdce83fd473b3c7aa5
SHA1: fa1d4752732aa19ffbfaba0cccca24ec97f1cac7
SHA256:6a6fa8746cf315db5092494e9eb6a1b9bb23ca8c284fad391359f140bcca7279
File Path: C:\Windows\System32\wcncsvc.dll
MD5: 829548595113f651b79dd5ddf68119a3
SHA1: b02c9c02b0bd25e6db298f8c083d35f09cb8ec56
SHA256:b77f3d30a80d14f743fb5c97c7cf3577c3a3eab2b4a9498ce48d25e893f1923f
File Path: C:\Windows\System32\wcnwiz.dll
MD5: 14fd873ac19a5204dc7783a36ef820c0
SHA1: bf4449a1ab626c87ce8f6b7e75e59c5c575a334e
SHA256:c7537528745adcd5f8336edfed3fdc32e0c5747d18ef5ca55f85904c260dd6d9
File Path: C:\Windows\System32\wdc.dll
MD5: 44b50d15f978fb6338f471f1819c6421
SHA1: 08b50a038e6f26e06fd957d76d503371a67b3226
SHA256:3210f5298a80624394d845423fda0ac1285cf9414ffe17889a71aef8eb1e587b
File Path: C:\Windows\System32\wdi.dll
MD5: bb37af6e45e0f69222e057a74b4afe1e
SHA1: e6250b2107824b4398ae408925c10b7af9799c99
SHA256:4662064205bec0db7b10f1412e0a09a6e5e3b16de443aef7f79aca3ace24a51d
File Path: C:\Windows\System32\wdigest.dll
MD5: 696b55c8f4e83e7b93f85c6f8d8607f8
SHA1: 8d03349fa221c29123657a2f4b8648fb30916707
SHA256:4259e6ccae49978873dd177e843629a608c61dfaedd3139e7832ea2ae0f4b9c3
File Path: C:\Windows\System32\wdscore.dll
MD5: f9324953119a36b44225d71923249fc8
SHA1: cacc9b4d4a616b8aa782e36e73e660b80877ab4e
SHA256:270009fb212bc1718ceddd7feeb718efd97fea554f10563239aa692fafcdf072
File Path: C:\Windows\System32\oobe\wdsutil.dll
MD5: dfe5fff074c7c0f6f3be45c6c822ceba
SHA1: 8cf55f6a86bf4b20dc4cb3e932ce6772a4d39260
SHA256:5380cb29345f483b2d12627476fbeb379c886a04d02d2ddba0bdfdfccf764e5b
File Path: C:\Windows\System32\webauthn.dll
MD5: 14c26fbd2ebe61484f079125ac558a64
SHA1: 2d801d8e1c5a670be366109cc5885f3f22ff99ad
SHA256:422a5fdf42cbf3793c22a093571a5bc1f82ad1ce76235ac15f50ca0f782e7af9
File Path: C:\Windows\System32\webcheck.dll
MD5: 7414c553f87b67f068f8b29dc33bbe2a
SHA1: 0e3e5cb882322e32faad1c9b8d0b036fd6a99237
SHA256:10f9715d43b1e9024ad31c902683e062f8e60ed0592c468d1e04774dfe0b264e
File Path: C:\Windows\System32\webio.dll
MD5: 875c38daca54eae29747ab72836e18b1
SHA1: fb9415374f0575fd8090f67a015a82d312e5a552
SHA256:1bf80fde10ef503760e2b52ea00863a60a49af0a28601941ec85e84203bddb2c
File Path: C:\Windows\System32\webplatstorageserver.dll
MD5: a0f70b9f5df58881c1a76e894cc1cee5
SHA1: 9030616c44776e4a38305b8b6aae512ddf2677a8
SHA256:65cabeb128c619747461a190c1c342b583bcf267e0fec3d9421d0d1a77fbb336
File Path: C:\Windows\System32\webservices.dll
MD5: 2cecd4f383f5a21e5849ec84ba58ff4b
SHA1: 668b9b6ffb41fc2e05118ecc84842c9958d28a4b
SHA256:42bb8d9796a22216c8af00036d7cdb9c036645f21370eb293f3e1d429e0a2880
File Path: C:\Windows\System32\wecapi.dll
MD5: d3b2fcb3b434025432815c9086ba4ac0
SHA1: 56066a58d344d4e375b173373056ef83a45607c9
SHA256:1770dc8c10ff2b50d20d2474dc5b7e22d6306caa74d10139d2d47381b61a2c6f
File Path: C:\Windows\System32\wecsvc.dll
MD5: e9eb0c4037ecfd1e0f1e19c08e803c70
SHA1: 7870008e96e164a5dfc48867fd268b15baf87180
SHA256:2a45b38a254655d643661fa7caaaab383586dda744bab2532d26e4dc5e0be5bf
File Path: C:\Windows\System32\wecutil.exe
MD5: cfd6154f23a1a47ae39190b6bb23e03f
SHA1: 5d4a488627973020ac03fbb1a0c3d1ac5aba694c
SHA256:058332f0d856de403b4fb0defcb8d8970a79ba9b20ae199d249b2485ec2e7b26
File Path: C:\Windows\System32\wephostsvc.dll
MD5: cba85827716de89106f8e4ad7430620c
SHA1: 14052698ebadb46645dc69704e126c0de7e3999a
SHA256:ef2fead68fe003dac52bc2098962f397df80b7dcd79a8f45012a050c7c0e2db1
File Path: C:\Windows\System32\wer.dll
MD5: 17d8669a3342fd7d194cd1d9cff25c73
SHA1: b9a366af79359d908f4bd1afcf7d7ade94c606c5
SHA256:b30a1f66e40dca05952ac2bb982386c5f8f19be6c31ee7bf64fa747a8af01521
File Path: C:\Windows\System32\werconcpl.dll
MD5: 605f2b00f58cd51ee4f04dfbf97ae278
SHA1: f2682fb1510df8d5a16b2392e2c1ae9ce7a0b1d5
SHA256:af1c63d7022f9165b4e5d1a583105c7ebfe52a0c380240a91d19b423fa2ac352
File Path: C:\Windows\System32\wercplsupport.dll
MD5: ff639707f95bae226912207084d57c2b
SHA1: e96239b4ea9584df06ae318bc9ee094a0657de5f
SHA256:1d4ecc33a6371f85b852bca26c5a4305f3c0ff4f409f9aa25156940dbf3f0e95
File Path: C:\Windows\System32\werdiagcontroller.dll
MD5: e7d08030981e8a475530fefc56ed7f59
SHA1: 2e0fc86bc476d79dca6152f3dece07c1e0071af4
SHA256:f33592546395f2f56b1677b0c3168d5bb7927f70148beaa6e126d95793fa33f7
File Path: C:\Windows\System32\weretw.dll
MD5: 4a9592e4e98fd6bb92462a1514386128
SHA1: a023b387b50e4704c7daaa4d1af12d42b54d3ab9
SHA256:72a73f9ec30a21d8cb8979ff418b9aa3338171a71c3561b8c9b21554f6b8b904
File Path: C:\Windows\System32\wermgr.exe
MD5: 1a172e7c669fed8e6dcd1e4941568981
SHA1: 6f31b2c85122be3d8fa17e31baddde8efb443e68
SHA256:757a6b10bc3560becba2b94182d4eee82db6d0f049d3298da8f5f3d19d69217d
File Path: C:\Windows\System32\wersvc.dll
MD5: 8c482eff577b5b6a2a60b3f15d8d4925
SHA1: 8b38218bdc853bdf841ba8c95f3be127916dca74
SHA256:a76048d162b2ed87e8d4f2b5255d27eccf5233e12371f560f79b12cd41bfc366
File Path: C:\Windows\System32\werui.dll
MD5: ee6a7fd1d496a2f61651e471652e1390
SHA1: 90bb4fd700461e36db06456e0631e423731b9393
SHA256:77489d0757727139f4da9376e875dde241866e9ca65135ad72816bbb27d0eaae
File Path: C:\Windows\System32\wevtapi.dll
MD5: de95bc311e36f17951c6371fe89fa8c2
SHA1: 16f189bd81328827cf806badf0120ff02840e2d9
SHA256:fbb4bc64a2e0c8625de116e945ebbe7185f271efe1f0d0055004695053e35ec9
File Path: C:\Windows\System32\wevtfwd.dll
MD5: 214b05207583a8ffe5c6058f1840a0cf
SHA1: fac22f5def0bf63df5880992528a353ccf98284b
SHA256:99b39d78b83f76a54d78c4da9408e2998211a373f396ed338ae8f793983952ca
File Path: C:\Windows\System32\wevtsvc.dll
MD5: 9bddf9a62dabd24035d3bce9b1a633ff
SHA1: aa82747cba79d4dd776d139f969e14abe2977d9f
SHA256:00e9c5af92b7472f05c411b059229115ae29b1ae3ad6b26a847510df0fed7627
File Path: C:\Windows\System32\wevtutil.exe
MD5: 1f970ddf2061b33c148e72604d2170fb
SHA1: 1750d55d18b03db3d46f408c21c475558235383e
SHA256:5293a95be8f320a3af6d8c1d5e937f13d0ee2925b9b13538487dec0181ef5432
File Path: C:\Windows\System32\wextract.exe
MD5: 56e501e3e49cfde55eb1caabe6913e45
SHA1: ab2399cbf17dbee7b302bea49e40d4cee7caea76
SHA256:fbb6dc62abeeb222b49a63f43dc6eea96f3d7e9a8da55381c15d57a5d099f3e0
File Path: C:\Windows\System32\wfapigp.dll
MD5: df8220051d13b44e6a95cb9561dc85f0
SHA1: 7fa23db20bd6bb0954b28b784e4c2e93cc94e775
SHA256:b2e9e5a7214b749d087d9aaab07fce8d0d6f1be73c0b6602266246c368da71e3
File Path: C:\Windows\System32\wbem\wfascim.dll
MD5: b00769b60dbef868e80fbf4c9ae4c8db
SHA1: 50965a5ea9bfd37fe6f1c3a470a3c5aa91cae773
SHA256:34873bd55927c71a4295fecb8359a173af7a225f75f9e1b0d8bd19a3c5482ec0
File Path: C:\Windows\System32\wfdprov.dll
MD5: 5e61dd87220e0c841a601c3ae4d13e2a
SHA1: 367c0fbd0686d5b0f35ed626e8442ac079675e89
SHA256:c02571601d0693bd474a6d26a0dd76e4ebdaf6a86b46809c1765ac5ce2bc46ab
File Path: C:\Windows\System32\whealogr.dll
MD5: 489d733b96b0fbafc621b74a055f9430
SHA1: e2e7abeb615124a1d7ccc24b41ac4fe6069b5986
SHA256:88da52ca0aaf4e85003a55b8731b3878501b994cd262dab6f10406648abc5155
File Path: C:\Windows\System32\where.exe
MD5: 3cf958b0f63fb1d74f7fcfe14b039a58
SHA1: 37db3a31ae73538b9887f6e537f17cf49bbc3e3c
SHA256:a19f7b783bc5611095d577f5eccc12069ca2b5e92bbe37f415429bb72c09792c
File Path: C:\Windows\System32\whhelper.dll
MD5: 2f3b7298e4db06f227ea920546493123
SHA1: cff234317405b7d506c8bae8cfe27170568d82e9
SHA256:1b282ee4faaa90f274676421d69f8d6388dbd957aef39a8b57f2aed98a2f44ca
File Path: C:\Windows\System32\whoami.exe
MD5: a4a6924f3eaf97981323703d38fd99c4
SHA1: 1915fbfdb73fdd200c47880247acdde5442431a9
SHA256:1d4902a04d99e8ccbfe7085e63155955fee397449d386453f6c452ae407b8743
File Path: C:\Windows\System32\wiaacmgr.exe
MD5: 51a33b2190190bdbd1b084a8a2951c89
SHA1: 5cfd3b83eaaff11e75c855f62d5ce6a6bf4b9b02
SHA256:7ef633ebc3b457fc0d02be0f2194015e02da40554eed7cad203e26db766ecebc
File Path: C:\Windows\System32\wiaaut.dll
MD5: 647f25cbba1303ca8054f79c13b0b909
SHA1: a851b2b826a35527b477fea42b10837114ce4737
SHA256:7f7f074c02742426baad4e47910ad4a333b4b411adbf6f1427029fec8adbc29c
File Path: C:\Windows\System32\wiadefui.dll
MD5: b9c0ab23bdf424d5820c579fcdbf3332
SHA1: ea544e284cc070ba7a7e260a392414a694914d35
SHA256:44b9bacab1ce5b09e885785cb2b8c6cf1037b92a4e9f2b96aae501b1ea74ff98
File Path: C:\Windows\System32\wiadss.dll
MD5: 68fdb505097a2df199588338585ec567
SHA1: c8d3581d14d24f755b034c8d1f8f61f647d7eee3
SHA256:448292e3dc4a4f4281569ac4d64db8b51e354ee717a951b1ef047f7a44a79c3e
File Path: C:\Windows\System32\DriverStore\FileRepository\sti.inf_amd64_13cb4c639b27cb07\wiafbdrv.dll
MD5: 356fa6eb35e2f46ee754156c3c99a233
SHA1: 64480eaeba9f1376fec7240724134df67a1ea828
SHA256:2e6a5aea2ccd1a3de387bb0daca2909f01cc5382890610ab35b04775d650e6c8
File Path: C:\Windows\System32\wiarpc.dll
MD5: 203d4b8d88d4414c30da250fba72fcfd
SHA1: 2d1aef62d82cd1f137ba296b42707338222413bc
SHA256:7b73baa4f29e3a339a273b91e90ca7ae4e9f600713e1391f70f6aecb72343720
File Path: C:\Windows\System32\wiascanprofiles.dll
MD5: cdfe562dacf9422a5d04e200ac9bda98
SHA1: 37ce9c10c0e09e64be9809067f1c6a6961f39501
SHA256:b63fae7b8df37210d9eb38dab68126c69e44d005862573f153e84fddd5a2207c
File Path: C:\Windows\System32\wiaservc.dll
MD5: d8c9a9c0b20f31374771dc064a3a4393
SHA1: 0a6f634ffe208eecb1a74b43fa36eb4c72daf4b6
SHA256:a7765c949eee59aa69961c59a849750e0a0ad316fbb28731825da4657cf08561
File Path: C:\Windows\System32\wiashext.dll
MD5: e4358350f4e83629b3c760119506a844
SHA1: 01200e323afe6c57f51b202dd5b079c756c2d479
SHA256:5405fbca4dedd39cb26c9e3a91c79bbdb50cec6b303648cc98f4f41ef75094b8
File Path: C:\Windows\System32\wiatrace.dll
MD5: 5aaa6e18cc5706ebdc66d21fef51bf5b
SHA1: 482b64033e24a54bf54230bde0f02ee20406dfea
SHA256:24deca1870bd79b0377da66f04dd053959b93b6a1d94c4663ce4209d1d0038e6
File Path: C:\Windows\System32\wiawow64.exe
MD5: 57672b94bf24e8ec8dcd56f28142f60a
SHA1: 0ed9edf34ae137e3ef5f6a619e1fa12b0eb9d051
SHA256:5cbb42d37f3fea5496598a6fe85405047c7e78697e6fa474353cfedcae9883ea
File Path: C:\Windows\System32\wifidatacapabilityhandler.dll
MD5: 8dcfd113ba807d0f7c45d2714c541bad
SHA1: 1b7782fbc2c2a4fff1b3827c6abceb6ad2f92aa5
SHA256:578088b710eb963a4aaf42cf801a990c57008e58f108e899f798e9fa540ddc2f
File Path: C:\Windows\System32\wifinetworkmanager.dll
MD5: 65b3adfd5e808dd02b23cc6a529eca10
SHA1: ed91c8102ed06da4f4bc02f331b298407a013e61
SHA256:8d8e30f2dbd1d3554a0911977f2b0c504e7af5a2c2f993fcadfb4dcb06850ab7
File Path: C:\Windows\System32\wifitask.exe
MD5: 55ba4cb6bc8d542a4c2022dae1eac029
SHA1: bb01e0cdc5d4a999bd6affbc702453189a334013
SHA256:2a5aa6f17dd42e4114c28be09f9513e38070dab4e91252c3bd7d77a8b1993157
File Path: C:\Windows\System32\wimgapi.dll
MD5: 7a16ec54b7fea97115671b15c11d94c0
SHA1: 0fcee45e464788f5451edba7fee61801af5f4f13
SHA256:e76c77f2bea950f0a02df5032b393bb55845f98ae5b2f2a70fbb4069919650ad
File Path: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Provisioning\wiminterop.dll
MD5: 442e67525ac6972c8cfb57a5a782fb58
SHA1: 52f90cc154f890e0bd4dede7570debd9c779f373
SHA256:01e2f02532ebe377b0960111178c42ecdfab59d576c19d9c08122b4dfcbbb379
File Path: C:\Windows\System32\wimserv.exe
MD5: 36f778f2516eaf832ef7eee7e32c1177
SHA1: 18b6397a7493d90c5e1476ad8db8a89ff85a4024
SHA256:e37d471b3a997a848a7b032a739c6cb77ed91ad89ab0e345375124adb26f32f0
File Path: C:\Windows\System32\win32appinventorycsp.dll
MD5: d2192b8867dc9a90589eac9754b617ba
SHA1: 6bb961fdf7304357d34263075b7d82e0e56c5e83
SHA256:13186ca51fd60950038a2069f42645527f12e17820f55287bb0c3838b941e092
File Path: C:\Windows\System32\win32spl.dll
MD5: 3f179ff5622827df90070627b23323f7
SHA1: c90f22e41fa5c615537a9d683a2ea1e64572a7e9
SHA256:84103eef4dff40309fb28146f7f43c0fd491e14bcb8b540746a187f751fd8267
File Path: C:\Windows\System32\win32u.dll
MD5: 476be05ae880e2ea273a25a5c7ab2656
SHA1: 9341ec566878cdbb260ba583359ab789700ebc0b
SHA256:4cfa33a61214746399bf0dd1f405e150edfa410419409470dd40f91a3876e478
File Path: C:\Windows\System32\oobe\win32ui.dll
MD5: 33f0f83eb55d2957c1a6c7a0bc248aee
SHA1: 31a7cf8689439f971c12ec6fb347d4e8f816f1a8
SHA256:f87886a4c03b7125b184ea7adb725100d695514445ccc4cc35494633e03a7455
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\bundles\win_device_service_bundle.dll
MD5: 1c5aa223fef35b4846deedb84a9659b3
SHA1: 7b3db1d9693b3ed1e48a416cf93ccd870f5faba2
SHA256:dd67b417331d888180535024c561cacd09e969115529be69fdb1b328e970ba17
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_d372a4ea3b959b1c\bundles\win_device_service_bundle.dll
MD5: 42704dc290ecd0cadd336cfca1651481
SHA1: fe108df315a59353a7cd17bc0b68227bcf14090a
SHA256:4c74609aacf4763ce0567841d11fbad9669dc54ae20f98bcc4d9c7154e5c0b05
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\bundles\win_device_service_bundle.dll
MD5: 5e7df9223b7a1fa43907e70d2d29e67c
SHA1: 481a28eec6c386bdfbfbd2e57d83fe65ed6e559e
SHA256:e962366706435b4053d440b3eb443ea252a580f68300661dae9a4951e20c5571
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_b117548b2e075ba1\bundles\win_network_service_bundle.dll
MD5: 09290fb1a6b812453a01982f2349c0ad
SHA1: bcbaf6e699bcad402594d11ecd868bf3107de52b
SHA256:c53b844272d32b8c6256673a37c5ca95356d8b42e580358c9d9fb4d53d0f0a9e
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_d372a4ea3b959b1c\bundles\win_network_service_bundle.dll
MD5: 73b96b712715946d3a91c506a083395b
SHA1: 649072fba8339fd2bf9ec63931a5a623698910e2
SHA256:0102fca396a8735dfbc64dc48b02a92ee7dcb827ee7abac97dcfc4aae4eb68a2
File Path: C:\Windows\System32\DriverStore\FileRepository\sgx_psw.inf_amd64_fafb1d329fdfe2c6\bundles\win_network_service_bundle.dll
MD5: 20569c4fbc975db8029c35d8dd941e47
SHA1: 1853860266716478ad67234f2929163aa9541e39
SHA256:9ccec41e18146daa39714d57220d1d770d06ddb36bbb4f196469b4779f89333d
File Path: C:\Windows\System32\winbio.dll
MD5: 4b150d2cee1fb3366c4aab7b41ecde37
SHA1: 010df0e0e18471352615007b5d5c7820c3603770
SHA256:8644f05cdf082d56ecdd90be35aca4c6821a4a18389434a8213a6a47f4d92265
File Path: C:\Windows\System32\winbioext.dll
MD5: 122e440db494faf6d7351aa44a161a5a
SHA1: 9630709e85953c91729adc9a05cff8f962970617
SHA256:586b969c6d2049deb6def7910b315ae6db906a1e6f0533b3f4cfed4c3e9c4793
File Path: C:\Windows\System32\WinBioPlugIns\winbiosensoradapter.dll
MD5: 115a8fe9f56844c7dbcb76f9315a748b
SHA1: 2758ef8f1372f05afacaded5d4e071c45b3cb3f8
SHA256:b77e49a9e923b2edeb6084638cfc9fdf27837bc3596f48030565753e585d207f
File Path: C:\Windows\System32\WinBioPlugIns\winbiostorageadapter.dll
MD5: 5c7980d50421496b927e0924b08cb5ff
SHA1: 2f14aa3f5e260171a4e6bdea8eaaf7a91ede5735
SHA256:4d0ae728626aecf748769765fa7989a877231d4182724e5f2bcbf471e874aca2
File Path: C:\Windows\System32\WinBioPlugIns\winbiovsmstorageadapter.dll
MD5: 640c090ee6021595573278051bd7c692
SHA1: ac3306977ef60c8d967d636e0d88003d0ed4a5c3
SHA256:27bf4c5ca14821bd1c2f965e4f2053fe2af3c785651d1bfdc8983bbf5fd52827
File Path: C:\Windows\System32\winbrand.dll
MD5: b34f0330b48fbd332f521290a002cbd6
SHA1: 589c5eac880b96b6cadd13cddb3af198e96660ad
SHA256:77dada4be7d5c04bff82b02bfc87a806a48d0b1cdd80c3fcd01ff875768f3d73
File Path: C:\Windows\System32\wincorlib.dll
MD5: e5313fa7d38c6f17255ce6d4cdd8ea57
SHA1: 5c2a443a28c87334cd7e2dacb147166b42e1ee76
SHA256:1d83496ee41debc87e94f6175eb760e683077d89bd756e3c4d22f8a6b20bb185
File Path: C:\Windows\System32\wincredprovider.dll
MD5: 534bb475258a44a258c0c833cf247930
SHA1: c47966befcad49dc87aac0bb7c12d02ee4e70159
SHA256:71d4d6a56b5238e76f27d898bf9cc54fad3c8994575055d7213958dd08608bd7
File Path: C:\Windows\System32\wincredui.dll
MD5: cdc4f8d59c67e9fb34d63506f8066fc3
SHA1: 49848298a4a44887e2e09eaa19f9f08bfae58b7e
SHA256:9e90ca7b5b79811b13b4c395d2d255200f9c432d1eb6dbc73430476da58cd300
File Path: C:\Windows\System32\oobe\windeploy.exe
MD5: 621e2e4c32b86d1dc6c24f203f8aa63a
SHA1: 21e1be407c14ef9c685d2e41dc9c38225df6f081
SHA256:e16cc90ad33e9391cf7af9dbb83270a656590f09838f755e89eda20fffc69a50
File Path: C:\Windows\System32\windows.applicationmodel.conversationalagent.internal.proxystub.dll
MD5: 3f3964c5ba3ff006dfd395fa343f662f
SHA1: a83daa469e67121ec29b8e148262a745abbca7d1
SHA256:fbd32e7ef591016b65579f756cf7589d7dc6d2b55dd3fd4fb6533df46f0f4594
File Path: C:\Windows\System32\windows.applicationmodel.conversationalagent.proxystub.dll
MD5: e03e5a4d9904baa906a4f2e9b3ddbd6c
SHA1: 2ca1cd83bebd7cfe2bf29dbd28fd7ac6f9f9b00f
SHA256:5a05b419eb5e08e729afd2b271cfcfca13aa08b2cd5a68d6c89978b985cf72b4
File Path: C:\Windows\System32\windows.applicationmodel.datatransfer.dll
MD5: affcc8eca4d0a8170ee31f512e4302f6
SHA1: 1b3413ce8ba7dc4f8aa57180bcb6848e7a9e96ce
SHA256:ebd314272324321d5e165ea030626ba0cb72f9859e20f68e1e401bba49c1a9b2
File Path: C:\Windows\System32\windows.immersiveshell.serviceprovider.dll
MD5: 6c79210e68206a2c0ea56c5251e1f774
SHA1: 3bd331c0847a54b0246151a6ceb98824ec549ddd
SHA256:a0505dfbd2007c352b759d4d53c81e2cfa6de6036d94f321bb26681acec5f67a
File Path: C:\Windows\System32\windows.internal.shellcommon.AccountsControlExperience.dll
MD5: d4f4055d476a53d0b29c35e505db7fa9
SHA1: 979d9c127b05a80a21bbbe58c230317b0a5d2f85
SHA256:03d870d5600007cc3cd7afd1d290479dea6cb1e77d0725e18df31a7adf85c166
File Path: C:\Windows\System32\windows.internal.shellcommon.AppResolverModal.dll
MD5: dd78c6e307142c19225e47c229edd710
SHA1: 93bbf0a37c7b36770e709c6edd9352cad0386204
SHA256:a7bab0d03b79ce997f5a2ef2807d1219d97e7997364d70161002abbecf91335a
File Path: C:\Windows\System32\windows.internal.shellcommon.FilePickerExperienceMEM.dll
MD5: 011a614a0ae2c016404059b0342f0bfe
SHA1: ce89265f6b1f3763c0a86ddb8763ea1a67439b92
SHA256:345c3b42eedf39e7d0e80e5b114d8548179fe240b09c1f92c584c0bf8002ee8a
File Path: C:\Windows\System32\windows.internal.shellcommon.TokenBrokerModal.dll
MD5: 9ffadea742f282e271fd4456e03267c1
SHA1: df535ad7274b8b14a6af664dd74ee507c5a0d2b9
SHA256:578f31e609d40e7320fd439fbddd45756a00ba74de7ede92d18e02127ab437d6
File Path: C:\Windows\System32\windows.internal.shellcommon.shareexperience.dll
MD5: 655c9b11b1cb6ae6793e00a71c0500f4
SHA1: 13bb763c6c75eeb0572daedb1ff5a8b0acb2f866
SHA256:6e7fb679a5f626d1f0627436d55701c269c5e0617ef5c66bc4dd715eb326e942
File Path: C:\Windows\System32\windows.storage.dll
MD5: 04c72190ad09f37278792bfadd8b1812
SHA1: 6301dfa9754e7edc520c5d9eb3448fa38b3a4c05
SHA256:e5c383053e7d9c1a8b1c2f05e7ffb947d165d65940d8d1c88c77701af01c61c7
File Path: C:\Windows\System32\windowsdefenderapplicationguardcsp.dll
MD5: 4e2bc74d61971a27ca54762cce425319
SHA1: 6a496234c69c9cd8e0d510c25fed5808942abdba
SHA256:a35b507e500f2f7c6c62c28f2e219ca2912b47897221c527d67732e21d8493f0
File Path: C:\Windows\System32\windowslivelogin.dll
MD5: 9c80c37bf34cb8bf16ef121c0a70a730
SHA1: 9fa978e1552a9456623e52c6e6d66dfed5a82880
SHA256:e90c2370fa5072cd6a79e87a951f87da5684f02be5ff31e7b9b8fd1fef078bb0
File Path: C:\Windows\System32\windowsperformancerecordercontrol.dll
MD5: c4aa766409b111635fe6f0e26881996e
SHA1: 46171e99fb9e6a0e17e5b7a0f1f265cdcfd729ff
SHA256:9e4879ea0f2b992b69c3a255fc46468940b85e2f967cf891edeb7bf5c2d8a967
File Path: C:\Windows\System32\windowsudk.shellcommon.dll
MD5: e5deed89b986b3c8fb2370463cf5e589
SHA1: e09a39ccce416611e0b03c48d32dc38b1ff8bac1
SHA256:fbdd0bed98030aa3fc3823234f42500b5a1c453a6c331f5d518279aba910fabc
File Path: C:\Windows\System32\winethc.dll
MD5: dc0602cb06d085456d1577b807d23045
SHA1: 7b853b12997b4100730c15b5bec9243465f3631e
SHA256:e734f711d198322ee835e7e89ea5c901a2ba1349062aaa117842aa317aba0b40
File Path: C:\Windows\System32\winhttp.dll
MD5: 3fda42a2a533531a4e3e7fc04db57155
SHA1: 7f0a0267a3ae321a833b5a312e7a6f25c2057ed9
SHA256:a2ebb59e6a788a39a662f9e35439056ae4b650ab7176141bebdf3bf97b856519
File Path: C:\Windows\System32\winhttpcom.dll
MD5: 6e511f1f02a064d3480eae86a03ad46d
SHA1: f212a91ca22c888699a4c39cb5ca84031221f818
SHA256:3bf56212320d6d4e81a47f9d582f1e6a12e0e05f3c760eac7e138e7adaf87e11
File Path: C:\Windows\System32\wininet.dll
MD5: bdb0a85279ef4364c4ff4c15b3f0d072
SHA1: f5485cc6105138093e012cc3488f4817a0a884b4
SHA256:8a2dbc801ec996406f6c94c98e0a65092af4b20cc67842f1526ea4816b7da4b3
File Path: C:\Windows\System32\wininetlui.dll
MD5: 663a857543085abfac398644e1b0db11
SHA1: acb84fcc22230a90965db7f06883517bfb0d2de5
SHA256:cf9f8b753fcdb5660063518470683f71118cbdf307514777306ce418b1b19266
File Path: C:\Windows\System32\wininit.exe
MD5: c8141f2dcd0c7b75ec4f21ee6c3f0284
SHA1: 0530f7f1d2d32ca603d1407e948f4782579b8bd0
SHA256:21da0122ba7b723adad041969bded52eefa99b47571670599bc03b3d7e1e3788
File Path: C:\Windows\System32\wininitext.dll
MD5: 82a0c5fd0bebf33608fc26070021cc6c
SHA1: 112031454880563781b916c441dc1ff9a7fa45e7
SHA256:83b0e480ae9ad90312ebc4e98e4dfb0fccde92a689e231f9e4d246f50ae1fd19
File Path: C:\Windows\System32\winipcfile.dll
MD5: f9969c70ee3d72a3b9c206b37bed0f5c
SHA1: 83ee26f984efb0ec40660f4b245b174e7b4904a1
SHA256:1aa3af715bc2753662f510caa63c415d170e05029f9543fda7fe1bb5b88c53b0
File Path: C:\Windows\System32\winipcsecproc.dll
MD5: 9d0e7344b4ad1feb07404968a0b840ad
SHA1: 205670f78f72b184ffe879da271b94fd09b9af1c
SHA256:dc72e0c87ddd2eba06a482af5388acb57c15678015881e693316abfc0aadb8fd
File Path: C:\Windows\System32\winipsec.dll
MD5: c543abd4de0f1c3d0a42e10d550a1669
SHA1: 52ab289c03c066198fa3aee9a239c77c856e0a81
SHA256:78cb4614c35d5e6fb520e548fac51c83c4f4f8d4c4122fdc48fe5efcb5cdac1d
File Path: C:\Windows\System32\winjson.dll
MD5: 0a94e75a9669cc02e78e67f193b4684f
SHA1: 842c34041d2c38c65fa31fa380944bdff46d9f4f
SHA256:b6871f85fe3a6098f770c195b5234de43cab48c0105819fbb67d209aaf675247
File Path: C:\Windows\System32\winload.exe
MD5: d10faf5390bef9fc2734d80b5d8ab3a0
SHA1: 397509d0d382d24404d580fc04cc2db84c442c12
SHA256:5aeca51dd691e58e46890765ad57e4a4ac05b0ce7e950621f069f0b6e3667e50
File Path: C:\Windows\System32\winlogon.exe
MD5: ee34b5513cc18a5c33158fc5750cc8ac
SHA1: f876ec3f44b691e253b64c87f90145bf491b6c9a
SHA256:fcc138570359bc14d8e54fd3c18ec85d6c54cb10313d2f7872c0848a0eb55e71
File Path: C:\Windows\System32\winlogonext.dll
MD5: 1707765f4f86452b84cfecfcd1a1216a
SHA1: 9da1d6665af19cbe746ba92ece9f3bd1a2cc9ef8
SHA256:a832028fe3f0b7a99dcafe408305eb37e0087e755d7ec1582fccd8fa72876225
File Path: C:\Windows\System32\winmde.dll
MD5: 3b78d3d28dbfb196eb204f97c69f27c7
SHA1: 8aa0243a0fed9edf15ee41a9b55acb73aeb5e0a1
SHA256:b9f6d8faa4713195239195486c90064194e045282ed66bb443a32bbcb80a6829
File Path: C:\Windows\System32\winml.dll
MD5: 4faf3fb3dd9139b2bb416939305d1eef
SHA1: f484d06aea39743d7db5f265ad669e221335393d
SHA256:8883c4a1ef1f5c9b8bdd82d64e8cf0e4bb70c37295baadf2260d377643620362
File Path: C:\Windows\System32\winmm.dll
MD5: 0059946611d1e824621bb881211acbd4
SHA1: 2fd82f6d3845d04926754bf985cfeada7b123e13
SHA256:ead9055dc522bcab041c8eb7b875adb681a2f1fa851d4075789d78d0242711a0
File Path: C:\Windows\System32\winmmbase.dll
MD5: f0b2dcdb5a929912c46f99fdf761ed9f
SHA1: 71a3876e7437140c8cc3b7de171207f990fd6cfc
SHA256:eb1b5b33f1381efd3a62d4f9e6f9cea491dda446ddecd7d73598ea5b28f694f1
File Path: C:\Windows\System32\winmsipc.dll
MD5: a430ff7a2e0dcadbe9aa50a16a2aa4dc
SHA1: 9e178edaf65fa95aa2ac6301345a47bf46bed21c
SHA256:046dd9cc5bce2bfbad7ef2ad350b972c464c0e705b8da12d90cadd22efe4fea0
File Path: C:\Windows\System32\winnlsres.dll
MD5: 259b44414b78d69993019592d34de244
SHA1: 814967f07198e6a535104941f3a8dd80cce1ca0f
SHA256:60ab4c5413804cddc3fc31a3a69da839dc76c46f9d7804087c77b70d82dd2832
File Path: C:\Windows\System32\winnsi.dll
MD5: 6b475a57166beee0fb2f3ea4f9b25ed0
SHA1: feab8390c02077c2314d4dde1b8748f3d74a7174
SHA256:f2e6fa25227b08c0ef79ba1f2c3c1233e9df6f6f88e87fea6aacc073a5b1ad0d
File Path: C:\Windows\System32\spool\prtprocs\x64\winprint.dll
MD5: f2ffe1c42c250455ed1e1570b28ae5e3
SHA1: b04a078161ca7710ada8579131f81ece565c0944
SHA256:62ca6f6edcf65f0b57e8fc2734df7fee664cea71f475173a649472a456f202ed
File Path: C:\Windows\System32\winresume.exe
MD5: eb43cb44cf8898665a255e910f0a14f5
SHA1: 568b23b4ae79b41bf894cec0613f00d9fdedcd22
SHA256:d6e7cbc1e621a23a411222660eb99a330940baeca42d458714472369ec67df46
File Path: C:\Windows\System32\winrnr.dll
MD5: c2ac4d1fb552c88108a99a1b12264325
SHA1: 0894b72d6845a11a53049d680359736f2273d4c2
SHA256:e57deada125c40261a4f7530ad30b999993396e9381fd288544c32efac6a18fc
File Path: C:\Windows\System32\winrs.exe
MD5: d2c250c6b01198bea08aa355983c0923
SHA1: 87648c3120f9c2ce9c218e183efcaaef9f01e34d
SHA256:00b00f9e2a62550136f2d80428bdce22c8fe718784b7f8dafc29c18bfd782bdf
File Path: C:\Windows\System32\winrscmd.dll
MD5: 6b45585d444001d06f74027d0103fef2
SHA1: e728c8b6baf8dc3374034dd623c89f163e427b46
SHA256:e4df05a42e1b7ce5d9090b5e872b5d19e0a8604ed80229cb290c6059a6ad8c2c
File Path: C:\Windows\System32\winrshost.exe
MD5: 6790044ceb4ba5be6aa8161460d990fd
SHA1: f8da634cff92d525b98d99e91a6551020b3f5c0c
SHA256:047427e1ecc1d5758a9553f0e819a9536d9d56d279ba81f707fe377fa1433318
File Path: C:\Windows\System32\winrsmgr.dll
MD5: 6dbebbaf1c358ff2aa8f066df3a60355
SHA1: 95e36b6f202b9db2465b1fb867f1891fedf02b6b
SHA256:9be96778b747f251bcd72478179e6ae4069f02fdf4cea899065a00d4fdf750f1
File Path: C:\Windows\System32\winrssrv.dll
MD5: 212fa486a59bd7c40bb0ac574aa16506
SHA1: 9e2c87c8897b546406104426022c7d75564b23f1
SHA256:f2cdef0bb6317c9d25a824023eb74814635a38fbbb19802a67141122df170d57
File Path: C:\Windows\System32\oobe\winsetup.dll
MD5: 96375be558619c5be5cada715c85513a
SHA1: 1938b7c2612763e8093c3159b6519dec3179409c
SHA256:436f542153f58bf1b0d6881dc619504d93cd8c0cc2bd2b9fe8534f788c51f674
File Path: C:\Windows\System32\winshfhc.dll
MD5: 3a2109a98ef4fb32ed29db732c013f87
SHA1: 1cec03a98b432162f09b2ccead694016076bf8f9
SHA256:eca422802316f779196b0a46632b7d7eb2ee1b9f04afbe054ec44feddea3dce9
File Path: C:\Windows\System32\winsku.dll
MD5: 10d03ff660075205ca4d87f153101b45
SHA1: d2e64c9464e37e904143a0d61da9ca0b4b003120
SHA256:662f2f8c13a80a9a4ff3929f4848ce9ae1caef8c7279a5945911d4bec409ff2a
File Path: C:\Windows\System32\winsockhc.dll
MD5: 443dfcda076c0943aef4b4623d98e588
SHA1: 54f2df3bf947850a71cc8a1593873c600ae5d8fc
SHA256:efd0c60cf95837d1df786b10229792aa89f83c15889f8071d53ccfe0329cd99e
File Path: C:\Windows\System32\winsqlite3.dll
MD5: ed56adefd73154a03efbb6a2f384c9e9
SHA1: fcb952f797a2e53ef5a02472554f85e93a944f2c
SHA256:89b12837959455d18dbad7b1c8b0384e90948489c0335e5c76d46cd43e20788b
File Path: C:\Windows\System32\winsrv.dll
MD5: 19979e1729cfa0e56eb4cccb198dfd05
SHA1: a8c4d015032c054ca6ac99ed23457af2316ff37f
SHA256:7f2a683f28877562409d810946ddca2f069715cdfb249602251dfa50065fff7a
File Path: C:\Windows\System32\winsrvext.dll
MD5: 05b73dbae87a38ecbc843771de68c375
SHA1: 078734bf7b752f864c21db61717c187f52c6db25
SHA256:265c54edc632e9a284ec05ea4a5eb22bd048d2046a2f039da0a21f3cc737e8b6
File Path: C:\Windows\System32\winsta.dll
MD5: f7798d1138307da66ce085f2244d3d7c
SHA1: aab054a2b95edaed5af7ec835097630bf46d9c72
SHA256:4c6c063ebb2d50849e5be35840b3cce755fe4cae15eac312785031004f584e36
File Path: C:\Windows\System32\wintrust.dll
MD5: bfa70ef4da176adf3d0f1a67a8f40ca4
SHA1: a8456b9939339db8e2ba023eecabf9cedcdbee51
SHA256:cf1ca59f9ae46d58b94cf17b5128a7ce22e39fdcadb6b41d5a928d677b98aa82
File Path: C:\Windows\System32\winusb.dll
MD5: 70602202b65c52fe5cb82dae9a1804a6
SHA1: e5e976c7471cd571efc52b1ee06f38a97db9a91c
SHA256:ed473bd48c7704e96cfc258047fcdd3f601b778a22c778c349a1aa936cb0295e
File Path: C:\Windows\System32\winver.exe
MD5: 63dc2d604b8a96c9962494d1d957dd77
SHA1: 08fba88d84bb68a64f666f3b4f831ddd3aa89b41
SHA256:0f588a098af640a29c1651d17cafe662814943a4aad3bf4d043177f8298ede68
File Path: C:\Windows\System32\wisp.dll
MD5: b277810be7ffc438858c062839898c56
SHA1: a4cadbed36052943477dbec39db78c3219f0c4ae
SHA256:d9e3281c000e79688e11e787d672dd0b2d04bc5a55ff8ccda3c7ecad8a9d3548
File Path: C:\Windows\System32\witnesswmiv2provider.dll
MD5: 689cb1fbaa8233223b797c89a1572111
SHA1: c4ec20906e8e2d10560a452d4caca7012c45e37e
SHA256:7a62479513dbc4d184596805268128bdb346c2c9b0c2d292e8f59e20767f2979
File Path: C:\Windows\System32\DriverStore\FileRepository\nvlt.inf_amd64_e8d6bd1572f08034\Display.NvContainer\plugins\Session\wksServicePlugin.dll
MD5: 6545b0ecef7ff21dab0fdd5ff1f638b6
SHA1: 2fd2f0db4b9b8dc4c45cef277fd9457f82065990
SHA256:cf02b93635721cbcbcfaad55ea1fed44cf6c9b1080b0bf54007efbf9b8ebbb5d
File Path: C:\Windows\System32\wkscli.dll
MD5: 4847d95ce5553723a96c4113f36a3a44
SHA1: e05803fc746e9debc5b5e3ceea5d0a307b8a9278
SHA256:b983c601ec637886a4949282b11c2cb7c17d9bfecb658129bf78535888eaf90d
File Path: C:\Windows\System32\wkspbroker.exe
MD5: 1df5e90c131316aabcd509fd4a181dd1
SHA1: 726326fd43b2d21acca9382254b0070a97c6f637
SHA256:655a5844a0da782a02c9bb1404b4f57c819e470f5529249eda06bc92575ea7c2
File Path: C:\Windows\System32\wkspbrokerAx.dll
MD5: 2097f9b34114222288759eaae9e9d6d9
SHA1: 7af3b65192f0acb531030b41961751615a394719
SHA256:c6b6ebf9d4da38f17a25bc5888c99aaec1a941f69340ebc6a72954d83b662e5b
File Path: C:\Windows\System32\wksprt.exe
MD5: d42e5163cd5599a27c4fdc1508d19854
SHA1: d2e05dfb8332a9b237ee1e03be9f93c27b30848b
SHA256:1b2412329bf81d8de8b48cc599f0415dc19f6817aefc06c72cd9bca0fb617766
File Path: C:\Windows\System32\wksprtPS.dll
MD5: a9b377b2b5dec9f3acd828f2e8a8f443
SHA1: a53fc4e5b38fe419464d74bd11a745f50b8a2ba6
SHA256:25d2c0dcfd3e6699e149ecd66c8a63381553815d83be96831f178fea6e95c55c
File Path: C:\Windows\System32\wkssvc.dll
MD5: 5130fe229abff9128f4fd0d8799a3312
SHA1: c88f2bfa6958ea4e9e3be524e0e297cdf4d16592
SHA256:3e86e73578af654ff04b52eb78c34b5c3f34b034590b602804fc2cf12d012f60
File Path: C:\Windows\System32\wlanapi.dll
MD5: 58fb028f528ceeff0a16b09d43666b97
SHA1: 63d82b21e48a333983f5d90ed840e1e5cd92db2b
SHA256:859faa4f095284737bfaa6cbb10f7d002a43484169e4195332aeeb3421e8b3e2
File Path: C:\Windows\System32\wlancfg.dll
MD5: 5e9acfd2536c60891fb748753067914b
SHA1: 8cdce6569d2254217b4d303baedb9e55955c773c
SHA256:baad03851c8be2010be4866c0ddf2e707757060254bac0dbe26180ad0ac64f55
File Path: C:\Windows\System32\wlandlg.dll
MD5: 40d4d82bb0cfc380a3d26c70cf9dd9ac
SHA1: fccd2774c6a49d9d20d2012e802dcdfd582931a9
SHA256:6757ce0b6ebf106cff3b5e95a8d4d28e5fbb3c581c99e2065fa985b59c729a28
File Path: C:\Windows\System32\wlanext.exe
MD5: d178119d8de4e18b05c3defb22b6d3cc
SHA1: 0cbf3f61c88e7a944294d8e577011f44dd99a9b4
SHA256:8456099deb994f309fde890e4f0e571a0a67f9b7dd079516905175cd1500fa52
File Path: C:\Windows\System32\wlangpui.dll
MD5: bd7a4c339c6f9f2573696c1230947b14
SHA1: 8c2a280636330172ef74a60dc535e24ad6dfb1fa
SHA256:8e5f1fbb0d83ab405b7e8f5aa0eeb05039ddd5676b83e67a7e32e804ea71bfbd
File Path: C:\Windows\System32\wlanhlp.dll
MD5: 3e25b5a02877200d919bcbe61fc46f7a
SHA1: d6dce1621b87f019c1ee93b506c6919b5c2d4ad0
SHA256:b80eae7bbee929ebaf3d8318af51ca4a677f8bc60dbb90ca5253b73d474caa11
File Path: C:\Windows\System32\wlanmsm.dll
MD5: 1fd1027857a3693021226f5224f9bc30
SHA1: 5fceee82b27cd564a83b4ab646da38a801864884
SHA256:afebdaae17a8d13021908a32ecb418cfa2101b0f4710c0ea897da4cbd2859a9c
File Path: C:\Windows\System32\wlanpref.dll
MD5: c9c519baeea9bc3679576f55621b9828
SHA1: dc7a06f7ea6a262a52f38162de95e7d1c091fdb6
SHA256:2d219e5d709d27462b807e0455a2ecfb77d61e694d43dbad82eb81eddcbd881a
File Path: C:\Windows\System32\wlansec.dll
MD5: 7e7f9c225f1663a1b27ccfd0aaccf62d
SHA1: fa4cad5a61c14d5fca55a34c896ccb618dc53395
SHA256:448caba8611122f32dc05989a969d2e1e5e9171620a98c10a8c401bed370d497
File Path: C:\Windows\System32\wlansvc.dll
MD5: 7128e707c28f852052f77969307848de
SHA1: 4299dbf74320738b13eecb63197c05ea749ab0a3
SHA256:70d5dbea83563e821eba015b8072aaa20ab4bfca799bad3cabf06fb39f67cdbe
File Path: C:\Windows\System32\wlansvcpal.dll
MD5: 7a94586686315d8e98070bb4c11f12ef
SHA1: c837f2094bfefab470365d073a60ce50f0ad46bc
SHA256:9008d211d4992f0da5e18def7a658f2cd37c0950a092e2652d1d2dbf8f0dfcaa
File Path: C:\Windows\System32\wlanui.dll
MD5: 1942d1fd96092975f01ff0d083c44ac1
SHA1: d91ae97ae5fec9e2dc8f8ca8d2142a0fcf6a52a4
SHA256:879a9a4e044542dd27f00ad5dd399723b6754718795af43c1a3465a3d6c081ec
File Path: C:\Windows\System32\wlanutil.dll
MD5: 6cedeff8791b942cda0074dc8eb3ffbe
SHA1: 0e8f518c048ea83092e57a148e7be196816da6cc
SHA256:b65ba3645b811db5efcf28578dcb87e344c52f1473dbf7d805223196ee5f412f
File Path: C:\Windows\System32\wldp.dll
MD5: 1bbd568a770fbbbd60b1e30debfb53cc
SHA1: c5bac108a3aa752a93ec1f5f588d700ea0de1e0d
SHA256:fee9eb497584f79de420a01cea2df9e26d6d15c94448e1ad2cc38182fdbe3e4b
File Path: C:\Windows\System32\wlgpclnt.dll
MD5: 3eefaad6cb1bd73b1c5fefaa8e892248
SHA1: 1230fe39f833ee17b4b9e157a554e16e232295db
SHA256:05e4520a90217c1f0808b624f54dc36ab4dd105858a90c7e55e6b86913900a93
File Path: C:\Windows\System32\wlidcli.dll
MD5: 7b2182b3e0cc40015f4a1cb0f015b3fd
SHA1: 214cacf68848ff4ec14749624f1b41b2fcb695b9
SHA256:5547835c63974ee03461c7c853aa7e787702bd3c73f4e0dd457841b31b4b513f
File Path: C:\Windows\System32\wlidcredprov.dll
MD5: bb55c0260353a747544bb2701292d0e6
SHA1: fdb8553e8a03f388d750db30b02d0b89fce79a3e
SHA256:1a234e416d4a29e8e4e570e657f2a28968b38808734fe33b777a59f97fc04aaa
File Path: C:\Windows\System32\wlidfdp.dll
MD5: 0a5ee278144e1f0dc0025ad1e396eabd
SHA1: 736aec664723c772ff0d050e6bf2b5f99c07b9ad
SHA256:a99d6a0a980c97fda54359a36e5d271de1f4b1d60ab93dc6d9344679992c66fc
File Path: C:\Windows\System32\wlidnsp.dll
MD5: d75bd5baf0484f31cb06d1b17b09ddcd
SHA1: 9879cab85b1680acb385f47c3991d50583417a80
SHA256:8c2c73741518c021891394651397cff707214e24a67848f885fc283255353948
File Path: C:\Windows\System32\wlidprov.dll
MD5: 6a8939f6440a9a8e74723fcbfec5cd85
SHA1: c32cdb2aeceb4cd9192ce1725f5d353f343e59d4
SHA256:09915341618848f8d6c150704fa2d8ae7d9aec83d37751c3f5eeb5bb0ca05fb5
File Path: C:\Windows\System32\wlidres.dll
MD5: 0ae15e7347c07d4ea62da4760a1f8876
SHA1: c61228ad7388dfacf537ffad53952662b8fb477b
SHA256:9fed31bcefe07ac558cef96cb39969721357c7182a14656d3d88fb9b7437edc1
File Path: C:\Windows\System32\wlidsvc.dll
MD5: 22c051db36dae94af98bfe41b5b6d89c
SHA1: 063735d52bc0afa9ac430990ef50c2d2ca21d27b
SHA256:6814f5960b60ab2a86a84c9925f92f74a2c15114c171ad5dd6d1efe4fb560571
File Path: C:\Windows\System32\wlrmdr.exe
MD5: 59bd6f822956e54cdedd0c441372c289
SHA1: 2eff61f5a97aaf8feeeb6e13e4088c4d54e4aa59
SHA256:2f89115e1081c91babaf2961cef0bcf9c8f4ee803d3be6e88ace23b383fe7324
File Path: C:\Windows\System32\wmcodecdspps.dll
MD5: ca0e57b0235f7bcf4cc1c18fec8b31ae
SHA1: 08d16af6c497e5c596a9160cffda70d31d7d135e
SHA256:a03656b6acad86e15e084b48127dc851632ec55aad997f4816abf2f86873e96a
File Path: C:\Windows\System32\wmdmlog.dll
MD5: aaadd931f64d5e1b88560c6b4ef36260
SHA1: 93a3545aebda601253e4557b78a08704ba72c11e
SHA256:eb9d1ab609ff5ac37da072e1adee3136dfccc72a5351c6015d02b12e55aefdd6
File Path: C:\Windows\System32\wmdmps.dll
MD5: d97630ccce79248c40551d2e79014c21
SHA1: dbf6bf23d96194183fb97228b83bac5bb0eaef0d
SHA256:e1de0d2c2c4dceec4feb9d41fb3e9d50beb86a3c5e4061561b487645cf7e201b
File Path: C:\Windows\System32\wmdrmsdk.dll
MD5: f21f707431bc09744c538e05105799ec
SHA1: e5471d6e0bb34f5e7da218c2ff65b61a64422471
SHA256:ce8b2b8ce9e0f0587dbee0e0facbfb1436ca0ef6a2b6a517e185af663d83c06c
File Path: C:\Windows\System32\wmerror.dll
MD5: b1d9e7fd4f50519fef044b2fd9d6f163
SHA1: 236acf0364bde9cf5d3f825a6c07212da611d330
SHA256:458cc90f5bea2ff8da97807530489b875526473d5dfb8c7ddbda4f3c2a97d73a
File Path: C:\Windows\System32\wmi.dll
MD5: 6b25707fb209291415c05781fe6e2c75
SHA1: 5c3317fb0da9da9561e408399a6a6344363f5737
SHA256:2f26412c0f071b7655405ba3ff543b7b4ced763767dcc7309689253c2082d78a
File Path: C:\Windows\System32\wbem\xml\wmi2xml.dll
MD5: 08fdde40fa8065d9527df63e80a3c21c
SHA1: b3c2d240a1afe6f5dcd9d94a7da1f4204eeedd32
SHA256:c99522d5688ab49e90eaa77dfa5ab491a13120319a5b3dba61d11d5b08bd1d70
File Path: C:\Windows\System32\wmiclnt.dll
MD5: 9acf613d8f107c319ce511131ea1b9ab
SHA1: 517ecce3f48e14e14b081bcc7a4f90a6542cfabf
SHA256:829d8b25d8fcad7f2add7f4cb0e1334520916709d254c00e75e337bcdf73693c
File Path: C:\Windows\System32\wmicmiplugin.dll
MD5: b69810a913e4660bdedc858484f9c43a
SHA1: b8b5f83c6352ec258933f44d895bd7f4dc051ae4
SHA256:963d037364309ea457779aec8d5e75e2582722161626b1287c5e4f34ad0a3f41
File Path: C:\Windows\System32\wmidcom.dll
MD5: c2d2ccc8717226ca27d98f016fb62a23
SHA1: d6e1a6da7aa538e7e0fc45bb2d89851c420561c3
SHA256:cd6102bc0efdef5f01a27e222c29d56cc1f884a21e7145ef58213b1aa192ff30
File Path: C:\Windows\System32\wmidx.dll
MD5: 54afa76361d52cfbd44ae9fdfb2a79cf
SHA1: 2d5cbdae9a71c4d014bd66fc74f25a6f1376d297
SHA256:52fb39767985aadadf92bb9dcaf1ee5f25ddff5026fa1d1183219126439b0531
File Path: C:\Windows\System32\wbem\wmipcima.dll
MD5: 7d1b1f0818123c3e84f5e638ca92925e
SHA1: dae18303e41cdecaf4d2f91d749a301456d9f8d6
SHA256:7b51d865b587d63cadca5d0ee840267ed6f14fd522d9c5073af1299d4cd1ec3c
File Path: C:\Windows\System32\wbem\wmipdfs.dll
MD5: feb31a8da6cd33f8fe828fd3271d5a99
SHA1: 1295b8b1738264830dd37f73ca2f6f12c625ac92
SHA256:fcf8e0e938098290995df1e96288d2c213b66302532d0f30ce657ed06e2690f0
File Path: C:\Windows\System32\wbem\wmipdskq.dll
MD5: de187c5bb41f8d02864d4c475a170df3
SHA1: 3f3d39935eb590e272873096605748437ad45b29
SHA256:e490966348d763e5430d6dedc41761c932b57333df98bcabfd09d3e99191ae69
File Path: C:\Windows\System32\wmiprop.dll
MD5: ced43d80baf35e361e6f961af7215d40
SHA1: 72f9b21129c26adb0c601ab59c935199563503c7
SHA256:4b08120894c2728694f10e51b9999ee7dc9eaec9b57a609b62934d3620d33cc0
File Path: C:\Windows\System32\wbem\wmiprov.dll
MD5: f2ea1c49d915e971979f975f37df6103
SHA1: 214bbaef45c0ea29a5f40795cc2bcf37bb0ddef2
SHA256:1a7c0d09f2a4c5c64f9404bda0c24d77b0306832c6fac269803f41abcb962630
File Path: C:\Windows\System32\wbem\wmitimep.dll
MD5: 0e2fb8f7aa90d4e9442577321ffbd24f
SHA1: 418c27d9ff8e1343bd114b81e0c89b4d6edbcb59
SHA256:33f3065cf0ba07a6e1f9b52c9e705d80e0326fb60290a0cfaaae2347de112805
File Path: C:\Windows\System32\wmitomi.dll
MD5: a9edc9f27592cf0754732cdeabcfabb8
SHA1: 258c4c67627301f8b277dff78171144821eeb895
SHA256:7f2b6f5baee0237c176983677e9c3aaa7f839278f84e67c31b9f8679f24affe9
File Path: C:\Windows\System32\wbem\wmiutils.dll
MD5: 772dc322542ba8eb2fdf4242c54ddeca
SHA1: b0a2bb829a84ebd3ae771c7827dfb18a769cfa4f
SHA256:460c31b0eab2954b5fb3b2e30ba47c1a0bc5ea972108ff4b42d3bb5a5a42e3f5
File Path: C:\Windows\System32\wmp.dll
MD5: 39488ebdfa64f6c35dd6684a54f9d956
SHA1: e7a2268f4ca58260c0f45bccb90cfdbc499648e2
SHA256:1a5024372a6b673b77b1bf72d5ca1079c22f5732600a1a752e7708a4f3c26f5a
File Path: C:\Windows\System32\wmpdxm.dll
MD5: 70e68687020785e01dde4cee0dfbbabe
SHA1: afb03a73407307d77e3160dbb57b28358ccbf6e0
SHA256:a9c662b19cb31a78fb3fedc4e3c9a3e5f912076f6f1c4055028bc34c1c8b0d88
File Path: C:\Windows\System32\wmpeffects.dll
MD5: a5021a747698a2e72131c6d617598a9b
SHA1: 2f542944f808bb88f201dd83b01bb3ed06b63971
SHA256:785d8a3ee265c6f923decfcfd770965cd735ba9bcf7d9c8bfcb829cc8bf50f2f
File Path: C:\Windows\System32\wmploc.DLL
MD5: ce37df64da5ab7334e1143f280b2ef6d
SHA1: c97b719b2ee9db5c8a1576f5ea371e5feb0c50f8
SHA256:6a95513026c3fa6918aa8cba6cf0f451a7f6b09f2fa83d03b281a0f5a4e07834
File Path: C:\Windows\System32\wmpps.dll
MD5: 98a32567ef02cd32988a57aa25ed747d
SHA1: e352110415b372774359588c684755c9c3aa3d21
SHA256:7a512b76de307586d590b960891625522d98c36f5f090fca0d9118eb1c0569ea
File Path: C:\Windows\System32\wmpshell.dll
MD5: e3fd778235753092d08ca93cb56a893d
SHA1: 78223b84112d7c61460c808f53e5b6c554dc7953
SHA256:53c1060e681166ff774b03a132482946264192b801127328f2f320e21e0944af
File Path: C:\Windows\System32\wmsgapi.dll
MD5: 28c43dc20ac5c24dc7b6e364503ce0cc
SHA1: 8006f8020b4f335bb1185756eef8a4862a0905b3
SHA256:ebc2a79e8a4882eda45644f3a5e74afc06ae9b33550c335e39b395013dfced65
File Path: C:\Windows\System32\wmvdspa.dll
MD5: a96c87a29c9894760c027bbb0de09a41
SHA1: b130b0393009eb8c754b08e42665069fc69eeeb4
SHA256:33eb7df148b082042d3edd52175a42b3a6d9320b141c679530ed7a9ecb26950a
File Path: C:\Windows\System32\workfolderssvc.dll
MD5: 01c54fb3c56a81c9c2f8c8f7db2788f9
SHA1: d840abf2850151b05a701dd41c10ea0202de352f
SHA256:9594e45f729f47ca9702610d77939063fdd076dfad108999799cd0409ec995f5
File Path: C:\Windows\System32\wosc.dll
MD5: 2513d9a067c553adcb6500c3cbdc22f5
SHA1: 90a15e1abebca818313c01dda2084b8fc7080db2
SHA256:ebef8c4f4378566d42422653a52ced4570902143622487bb6987b8a31d592ee2
File Path: C:\Windows\System32\wow64.dll
MD5: ae92eaaefcd4c0c51d7de95818ddab7f
SHA1: 57c1794a9875b05f11dc962a7c4ed8fe8ad12fba
SHA256:524beadedb98d8136471759eb2c3c0273bfc979fbc6bad7d068d88bae6a9b89e
File Path: C:\Windows\System32\wow64cpu.dll
MD5: 1e8eb356fcb2ec39c2a841be98b04d98
SHA1: 1425220c29472afba744c1b7d2a93c4f98eabde4
SHA256:472bebb4ea80edb445e6d67973d7efcbab3d7f779c188f266c7fa2d724a045ad
File Path: C:\Windows\System32\wow64win.dll
MD5: 1ee534871b0a04b1ffa2316e83127dea
SHA1: c9ca31464d2a5c9010454fb120927b53b90d6adc
SHA256:74f59de01ac8369d4578f468326efd5ae977d1731d22382ecde6a19c33324339
File Path: C:\Windows\System32\wowreg32.exe
MD5: 0007386fe430341fe6c6edc6cc48542f
SHA1: c31402f33b4a4e2bf15bfb823440eedd2f8c1705
SHA256:e2a4237c8384e3b55edca7274bf53d4ea89e62aa70cc858e2b2c7509f2e51814
File Path: C:\Windows\System32\wpbcreds.dll
MD5: 8b833ddc2c47dd804e23f62abc316444
SHA1: 8670e6d4522385cb857e03aa594fa7ac5a119a15
SHA256:843f43bc85523f266ed45c190b45a13a7c818a3ae90dee9abef2662c9c89008a
File Path: C:\Windows\System32\wpd_ci.dll
MD5: 271ef07d91cb5193be04f4dd6e6d608b
SHA1: 5b029e17ca71434296546e498bcc8a1eef30ea8b
SHA256:c626c857cc906d00a710766131b56c9633b35644d9e24879e52ff938b2277dcd
File Path: C:\Windows\System32\wpdbusenum.dll
MD5: b63c5bbf6a825d684a9cea9a0ac695ce
SHA1: 2799f035edda4581d8bd824865a1520b12371854
SHA256:89baae2e9946dbea8eb790ec1677add58f62b68ebaa14193959084efa79c8952
File Path: C:\Windows\System32\wpdshext.dll
MD5: fd18a21474c7cdd0b093ec74ca510c07
SHA1: c4e918a4c853023cac09d182cbb68b9f921ebb0a
SHA256:200378931569cd88ae7758d59dffa608c4e51351b7b9ff3171c8763d18f4834f
File Path: C:\Windows\System32\wpnapps.dll
MD5: 68c5818350be6678f3fa3a81ade8c275
SHA1: fe48e4f0cb8361359d89b4621a33475bd9c624f5
SHA256:adbeeeb5a9333ac2858efb1a7d8cf2561cdfaacf41e07736ef60295c5da6f203
File Path: C:\Windows\System32\wpnclient.dll
MD5: bb084d1887662eb63e63a16fda2cfd48
SHA1: 02cc385a0729e5af1d8a3ed28be606f33b07194e
SHA256:77b7c71c19566a93cb887cc0bdffe27dada7916827975bd22bf3217509581e0a
File Path: C:\Windows\System32\wpncore.dll
MD5: cf8c122ff16da5b367d11e288bb8db80
SHA1: a88e359ee15a81077f853c60a1ddbc86423c5109
SHA256:b7253d1a9d8d445284e3ebec12d4816959ad468e807cd360e8b24a39fb7a1d61
File Path: C:\Windows\System32\wpninprc.dll
MD5: c1bbd5950b3802911da1e5a1926ab85b
SHA1: 24a4a231c668c0be1e00bbfc925a9b49bd25310f
SHA256:712db18997fde92f6ccc8641ec87aa2e0510110361e7661dbbb58ab928fa1778
File Path: C:\Windows\System32\wpnpinst.exe
MD5: e6c33cb509361723831215ea2e81c364
SHA1: 57563a9315b4e56cc435779906e72e53bf2497c8
SHA256:ecbf47894281917cc2c86e3af5e8c4bb9dbfddf9e0b05414927645d7ac23c4cd
File Path: C:\Windows\System32\wpnprv.dll
MD5: 6221cdb3c0337a1bf771385a635e6814
SHA1: 48a8f9bc632dde316bc96c2978bc415d3b0f3615
SHA256:05e2a77c73a4d79654aa175ef5cfbae528aa7b40456a1f2dcf6a5d15175655df
File Path: C:\Windows\System32\wpnservice.dll
MD5: e750ca5f7c4ab3a0a92999aa0a6bc1b6
SHA1: 639f7a961517817eca0a0fee7e1ab6fd34ced252
SHA256:55b5998adbf5751c1c7156158cd45d1d67e63d233519431d653a4b44fc828c52
File Path: C:\Windows\System32\wpnsruprov.dll
MD5: e41a8a4688bfb60d50b200b45d2fe327
SHA1: 7074e60bb83d69c9ee23a4127f5c7fe68ab97fdd
SHA256:45137430afbf478bb09cd9cb7a738849bdb7db29dbb35d4934fa3220ab1ad637
File Path: C:\Windows\System32\wpr.exe
MD5: 492fec335f2ab40d3bb83f8b16ecb1b5
SHA1: f5274e02711ef2e946be387ac620d702093056f4
SHA256:1d96146fabdfc1308cf57c05f1344fc78cdd2ebab45b487103c2b9af6289cf8d
File Path: C:\Windows\System32\wpx.dll
MD5: eba090363bd429852586ea65267d730d
SHA1: f99565c4cdafa26638e8acb88013ad2437f8cb31
SHA256:ea99df46fb70c41d8965463def95ab42fa39207f569cf603556b2d2ce6bba2f0
File Path: C:\Windows\System32\write.exe
MD5: b947cca7f485f6c1156f4d02e8c9874f
SHA1: 9f184e48f17f104c6a476687e8e760a65a0326b5
SHA256:a70d52eda892edc073932b462cc367cdbfbace3f4196857d8d4fa869a13de792
File Path: C:\Windows\System32\ws2_32.dll
MD5: 5dea93cf25dc0fa1e087cf384fd7eab6
SHA1: 51cdbb883259a2a0835381a8a1645d0db6d29abe
SHA256:5e9857a80a301ad21d0e0a0928a4ff2b5360c305a97bfc88886e3b686bf8d503
File Path: C:\Windows\System32\ws2help.dll
MD5: 1eb8f9a912715ea39eb85617fb12608a
SHA1: d9c9d615be07dccceb37d6a5b723ba8354023494
SHA256:b45001d6eaabd3c87eaa1038c3fc8e912258fa7896c2b65117ed7de2e83683f9
File Path: C:\Windows\System32\wscadminui.exe
MD5: b09f9f597da28ecd8ddd02997a043c71
SHA1: 5faee12653c166cc7b4f7b53178c8d86e627aa12
SHA256:c44fd899e96ff14727a6288edc05576596f1c1bb776ee2c0658689e8cf684a7c
File Path: C:\Windows\System32\wscapi.dll
MD5: 253efa818c0d40300aaba9a4c6a46774
SHA1: 97dee8c358cce2513a112b39536d76eed5146f34
SHA256:2770d0e074bf9dfb74c10cc29fead1d7f346470e45dba23f5cf5233fd88795e0
File Path: C:\Windows\System32\wscinterop.dll
MD5: ed6f9aacb375a65a7396bb7fb092be50
SHA1: f4fc12981b0eb3e1704d9ef5b3900cd86608af2d
SHA256:884573880ef6eb37f08ba143bf5ba9f1cc0b08f834f18799d924c587cd518dd1
File Path: C:\Windows\System32\wscisvif.dll
MD5: 30ed79bc8c342eddb6821600ce467729
SHA1: d7d6932e50d07622ec9f3ff479e295329df5362a
SHA256:6742014e8f1467a838458d7b61d454a5055f78c13923fc81a3604a41a972d9f1
File Path: C:\Windows\System32\wscproxystub.dll
MD5: e6067ee38c46943c0cafaeb36a4d5e94
SHA1: aee114083488ebeb98aabd4a916ace138d2e8179
SHA256:ff0c60c63b56ef2a95054bf56090a242a9e702a617b67f1d0aed9c3e084a429c
File Path: C:\Windows\System32\wscript.exe
MD5: a69259a7c57367d07930169a86006130
SHA1: 0feb54c3151b018bfeb244255009d71a37df544f
SHA256:4173fc5a6864f03ab021823cd0f2f085ba85b3a9b1e37a2094798fc099507523
File Path: C:\Windows\System32\wscsvc.dll
MD5: 3d62919cf12a94c7bb2580a5203e79ab
SHA1: 4256e945850276e36e0476496258c668ecc43447
SHA256:d2dd733f42647af0635b689ffb0d388be4af0a34fae1b048f4cd38d585a9200c
File Path: C:\Windows\System32\wsdchngr.dll
MD5: 1d5915b27fe712643fea3d03704944d2
SHA1: 307ec7c81c20197b3cccfef5aca63bcb26c5230f
SHA256:bd0eb128cde5bd4148244fbbd009caa305d548b9b0fff7107e7ebbd9c0a6abcd
File Path: C:\Windows\System32\wsecedit.dll
MD5: 46920415681759beb97eacda721e7ff2
SHA1: acebeb97d6e8944c57d6ac4e68ccce1346dbbf88
SHA256:767d9f491c74e2b1c1f6c4ae165855d77b8098b170dee98f43f31a0b9d81bf57
File Path: C:\Windows\System32\wsepno.dll
MD5: 0f5c2e5093f94c038f50f8ce71460e37
SHA1: 162750de4c46d52a18ec9a179ffee4a0ce83db81
SHA256:43d18bf434224763fcd4111a0cc7b2465fc99d982d6ab55bda76377bfee0bba9
File Path: C:\Windows\System32\wshbth.dll
MD5: 2b76a5d05421e7e7f578c490f153fab4
SHA1: 0df70acd5d6aa7d7e41a62bb7c835e3f1c4a0c6a
SHA256:a2d88364f744090169ff61e41de8892a243daed5de4fe641a383c59734f8f132
File Path: C:\Windows\System32\wshcon.dll
MD5: 6e72bb20a07bd53143f664392fd17176
SHA1: fbe12de82b1a1375c3702123d54ef524d88162d1
SHA256:953473ed4b92b5f6b00e63856242ba12d403c7cde214688d909482796d03c8bf
File Path: C:\Windows\System32\wshelper.dll
MD5: f6600bba214d3a8e8ec1b58a77ae9cb1
SHA1: 382c34ed6611dc86349f6377e477cf4f920ecaa0
SHA256:9b38b19e5369c0abe0c8654d0702b4cd45e9de375eef35f0be132e02dcdf9874
File Path: C:\Windows\System32\wshext.dll
MD5: e183399f0bdc4836f5c35149e618f755
SHA1: def3614e774e04cfd96da7f6d67a59fac820277d
SHA256:190d7e6036460389d4c604a1e0a6b43b968b20177fbabb251d46bbc7b9dafd98
File Path: C:\Windows\System32\wshhyperv.dll
MD5: ff37b886dc071aa4ecad972b2b2afc4a
SHA1: 8ad3ce391f04d4128838c46d993a9c83d6112336
SHA256:65a48a82355a9068e6f5d01425c959e61ec9764e1f463a223320478353fcbd00
File Path: C:\Windows\System32\wship6.dll
MD5: cddeb73389da9353ff0cc759929a0d23
SHA1: 17532271d7f582db62eeb0cba422c7751996f1f3
SHA256:662e908d4f8a86a60f39f0fe8f460d1a28b5c2c721883f3b00369a504b481f86
File Path: C:\Windows\System32\wshqos.dll
MD5: 8a698041cc0792994b5157f9c391d734
SHA1: 1c4ed957cae78356bb8d233637d844ba93b09fe0
SHA256:095a08658d05cf0cddfa78a4551a40c62d9e0f036111289ac29205e0c0f6b717
File Path: C:\Windows\System32\wshrm.dll
MD5: 4e32d25bda94032c33fa5055429c1081
SHA1: bcef6d6fac0df55ca11ca3c64ff35db6092bf1cb
SHA256:e742f8b033ca3e97f3f3c31589326af0b37c98f9a136928c6f47871a760a98fb
File Path: C:\Windows\System32\wshunix.dll
MD5: 7f03605772f3583000dc96e85c792644
SHA1: 8ffd5bcea3b6ed65a3af231f8b38252ad4e2a04c
SHA256:58c9e6e865eeaea8f970a09b6d784e9a3bc12827b855d62349eea9e486058a92
File Path: C:\Windows\System32\wsl.exe
MD5: 7a0e650b92684530bb33dbf02e89de32
SHA1: 84ca6eace4e2d08c7894a5965a8297675c1fc3b2
SHA256:b4b85596a123b6d610d01c95d9b505d237f1117e27d4c1b9edf21a0aa1e5fc4c
File Path: C:\Windows\System32\wslapi.dll
MD5: 1f704494f1a231cd762e2a415a3aa43d
SHA1: dd8c66d15992555e49fc42f37346bedfb693a5d3
SHA256:1d3835895d1f4219da760e8b762efafcfad0e8facc6c63fd75310cd4e8bf5806
File Path: C:\Windows\System32\lxss\wslclient.dll
MD5: aebb3280bd7e2148da4a3f11b5d9459e
SHA1: a69b0178cdcce3ad4ef6aa32bc1a7da37aac2ea6
SHA256:a657bef2c4024b75c8a6c72caec0f1c95b1f644b8ad9974403d8628b52b484da
File Path: C:\Windows\System32\wslconfig.exe
MD5: adcc95eb115946e5dd29387ed114cfca
SHA1: 14780b735934b72a5ee35496509e5bd5890d5bce
SHA256:1e978ecc1f05d4a41f1d2913048d17a04c0766d4b861a58a2f09612b7da64f45
File Path: C:\Windows\System32\lxss\wslhost.exe
MD5: 29979bb71fe39356470ad37f6c5271b4
SHA1: 92e1f26babf9389633d96282d040358dcefdcd4c
SHA256:9294cc736b72f4912e72c602b054b257ee3acb8eea33d238a7bf927b1b3e10d9
File Path: C:\Windows\System32\wsmplpxy.dll
MD5: d338dd5dabd9e6bba5c0caf96510d8c1
SHA1: faf9f744d942cfa40f0c3adec545e107ba91c711
SHA256:81ffcb3decd627e6e8b02ce9e9e5d1614a06369bdb39e3ddd03b1b2969b60d97
File Path: C:\Windows\System32\wsmprovhost.exe
MD5: ad2f122c747a52b6a086ea1d61827bc6
SHA1: 216d5c3bd7ce2a64b8dba9133587d1109b506e43
SHA256:3f024e4b57c2606a3ffc9a98b22a895adb6d173e87af6037fde16d6df640488e
File Path: C:\Windows\System32\wsnmp32.dll
MD5: 46e9550e5ff7fc6af8d88ca3b0244efb
SHA1: 4c92bf0e57ce6b8d790dc022ffceae834ce2374b
SHA256:19398e71ef3f095d9c14ef778f00714822ea8d9d6d14047de8814eb9ef1006f2
File Path: C:\Windows\System32\wsock32.dll
MD5: 7ca726d8c2d54c70b84b3cd492291eda
SHA1: bd05c93210f10a639b875bb7a388c7729939d0a6
SHA256:f7f82e8b40daed62e8e5741dcba3e135873d9f28ca86fe3e5303b222fe4fb685
File Path: C:\Windows\System32\wsp_fs.dll
MD5: a37ca15f64208b0e52d9637923490361
SHA1: 99da3ef5b87b5e32c507d5d1bba72bf77b58e1f4
SHA256:623f2fa2ca8b3fef769bd316d50346d397d1c1dd0c9f33fd9fc772da60c36c98
File Path: C:\Windows\System32\wsp_health.dll
MD5: fb266647f3ac9002914b0eca051f44a7
SHA1: 22082e102c157fef2baf5984423753b5df27714a
SHA256:c6d6285df503e0065148f239a642ede4bc04b8e694fb52dac720e2f35141055e
File Path: C:\Windows\System32\wsp_sr.dll
MD5: e8d0027a1b6d67a1d8fd230174b7f28c
SHA1: 2136ce8abc83b5f2d979ca1645954b5bab19d913
SHA256:fbd56b53452de459143710c8baface3b3ed8248698a9250480fa4a3a2cb3ca61
File Path: C:\Windows\System32\wsplib.dll
MD5: 395091df184cd5355851c2634f24b577
SHA1: b8e36d84dfef184bf753f4bacdfff4a2b71985b7
SHA256:7918856ec280a9f727d6a09ef0182e1be0cc2e31401e9cd4ef784dda99f85295
File Path: C:\Windows\System32\wsqmcons.exe
MD5: ad875863bb1c062296d8af85eaac7f54
SHA1: 50b05f30d1d35c1856319159edc575615f1bb05a
SHA256:8d407371f9f340f4eb2fe48ee563ebf5707488a7524473b781ee1d05a2168c26
File Path: C:\Windows\System32\wtsapi32.dll
MD5: 34fdaf8ebd4f572a413e2de5cacbe7b0
SHA1: 350d1ccc6ca984fa15140be57b2454c436db5fdc
SHA256:70c4f49b0851fc7353deb25a6cb95ef52646b7f08bfe20a5ed62536737d12fdc
File Path: C:\Windows\System32\wuapi.dll
MD5: 125fe94b255a3c57f2ba9560f05a9532
SHA1: b9660336f7c04993712a403e757352a9cc00281f
SHA256:d026b9920295424ddf0163965a3164d2d9b2c935592b57672984285f99e153ab
File Path: C:\Windows\System32\wuapihost.exe
MD5: 9d1b68adafe750f7048d2f9d7a2c570a
SHA1: 9a577ced57e39f28d3fab7617f62d877a264430d
SHA256:1c098b099f043d4d060485452a3be7d9d0413a5e922678942fb48fa20abcb3bd
File Path: C:\Windows\System32\wuauclt.exe
MD5: ffb1c4fb6d1ce5e27dba503ae3b49052
SHA1: 6232fdd08fe05a95b61dfe3663fcc90ead9a422d
SHA256:f7a11a737fd76839066d15ba9e74216a427333d8791613485c5cee5ea0658155
File Path: C:\Windows\System32\wuaueng.dll
MD5: fa67bc1543975f68d26dcae57b91441d
SHA1: 7e5d41478ac191ce5299d60ab0684900bd944aa8
SHA256:ac6484959637d6e7b7959a9f9ddebc6b5ef63a4086d1e7512b41d91c108f4e0f
File Path: C:\Windows\System32\wuceffects.dll
MD5: 843ba76fc994c72b1b2f8c571676416e
SHA1: 9940fe59092cb2a746c52ce5b585858a966e168d
SHA256:f3ff0d78efebfa090cd5f9d6b861431e4b859d6cb6bd68de1237e891d1abf1c4
File Path: C:\Windows\System32\wudriver.dll
MD5: 01b4581eefc255f5edc4abcd4a72176e
SHA1: f026e24bc13ccf17ae3e4d31030ab227c8aaf9ca
SHA256:50937d8c014a71d562adfab9d84a037508d1707d0ac8f5451c9ad342b498bc9e
File Path: C:\Windows\System32\wups.dll
MD5: 3ba4d552529626cc29e59bb3a5866f5d
SHA1: d888b45faff268be7b6a1cb59602abbaf339d9e9
SHA256:8cd54e211b3b4b6a3179348456c8c6993b3762cf940c1edd32d0246ad934c83b
File Path: C:\Windows\System32\wups2.dll
MD5: e486c072f2382c5185bf1073e4f83abc
SHA1: c7bd2a11f69ef923835b506ae641bcd6129fab25
SHA256:61b80604d425d5b9fef18bbe67d1539f121de2b38a95f1c2e82a96286ff4f393
File Path: C:\Windows\System32\wusa.exe
MD5: 199f3310ca3ed2de80885885a3e25753
SHA1: dde2e85d0b7a47dc9bf9934453248bdc6f0b1f63
SHA256:4068e996a279cba982a5cb02fcc28c64899a98c488f9a5f0f056e97f71b819aa
File Path: C:\Windows\System32\wuuhext.dll
MD5: 04407c5bcf77a5edae2c9f592bb115cb
SHA1: b9ba28853427e80925b12229fa90e9e7ef672b6c
SHA256:93236e9bd3146b978078c0a1b411847fe34f7779708829485e0ffaf70f2f2ee0
File Path: C:\Windows\System32\wuuhosdeployment.dll
MD5: 4d9165d583b9c63fd21f48f94890a21c
SHA1: c6722af8e4cecb73391a8e34b41674517c7f558f
SHA256:92779f1ff9a6e8f56e0fc6de0503a7721a6910a73ea2ab6ca46e42e6f92a2404
File Path: C:\Windows\System32\wvc.dll
MD5: 007aed0f81acd6bfbc24c022a209643a
SHA1: 42c3031c04b41acb3e9a8b7d7fcfc4461369d0fa
SHA256:61f9e19a4a2b0fa9406e638b4e5e6d7c90c16812b4ea31cc6d1fe014192b9b14
File Path: C:\Windows\System32\wwancfg.dll
MD5: 997b0b584ffab0b7ff9cbbfc60d60bd2
SHA1: 2985c0144da0e9f5dcc0092ac54a5ff99a63f761
SHA256:c4b1f99e87b4568b5b9ff2ded05cebc55376051d44877f5574f2c125566ce604
File Path: C:\Windows\System32\wwanconn.dll
MD5: 7801682af9dfbf1fc2b2d2b058646de3
SHA1: 77a0fe1742fcb323fc1c9cd7767bd90162f7f64d
SHA256:448261868391df90c3f596db412c6f6015021c7f32c54f634041fa900e575c2d
File Path: C:\Windows\System32\wwanmm.dll
MD5: 5fe7ee96cf2404cbe20f93ac276b4f69
SHA1: 4c6536da70d95c1c828c7d380d4e9cd0dd603dcd
SHA256:20d69b5de42e2a105c076d8f9aff821415b81dfce8795bfd9e6b112e915b6a67
File Path: C:\Windows\System32\wwanprotdim.dll
MD5: 7e91bfb58e0f0111d4ce1b477bcbe3fd
SHA1: 02ea3eec71f341ed947513546c1d43a8e1601648
SHA256:ca375965d9edcf625f2b0f2a057bc5190c9fc32d73ed802cf53c2471a541506a
File Path: C:\Windows\System32\wwansvc.dll
MD5: bf4a85f20569ab17b0b68ad302eb714c
SHA1: 25577dc79f73fb6c064880eb0131092536713e8d
SHA256:96d5f85ae741ed2ca2953b59f5a7f7e82b50472a7a8426c113146dd4c107eb4e
File Path: C:\Windows\System32\wwapi.dll
MD5: d5efedcfee4f17221e7a8c3076345165
SHA1: 642f31f79623ce308710f2a18272d4ef82e513de
SHA256:1cfe80d1d20cf94254bc7e04ec051a10cbb729c1436e475ae7612b3a7e5c4ea5
File Path: C:\Windows\System32\xboxgipsvc.dll
MD5: 355ceb2946e1e6f904c53fbc2e9a628a
SHA1: 584a601591a1f764cb34ffb6d3b598d6a5671c1f
SHA256:d829fbb66adba3f16413f3147bac85e36b0c02e2c8093212788e7b6712428c9c
File Path: C:\Windows\System32\xboxgipsynthetic.dll
MD5: bb92da532c0310790c11cda51c57d463
SHA1: 858b0cdee7dfea52d83cd610d475fb9ae738f830
SHA256:7576075502143d4a80f5de81cb26cfa676526230f70d8944224d95ef216c6ed1
File Path: C:\Windows\System32\xcopy.exe
MD5: 39fbfd3af58238c6f9d4d408c9251ff5
SHA1: c5bd7815ed18f7e3d1ce93cc47aecf58d908dca8
SHA256:269eb0728413654856f4b2ee1fa7838cd69672ebc11baed4caa63f58c2df5823
File Path: C:\Windows\System32\xmlfilter.dll
MD5: dd8178af6f046003a9d14f56da33427c
SHA1: 98fa66e73101f32285c4ef650a3fc24e1959bad0
SHA256:0068ece042596512567f28a9bcf95b3654e6911f44ccc88f5043924d14362342
File Path: C:\Windows\System32\xmllite.dll
MD5: e7720919d12441ce1350c02cff13761d
SHA1: 4f448065e4c7eb5255c834d46c5ecf255cf954e1
SHA256:9b4f95b15447267f2511513d7793704a5a88ddbb0fc41f7c8a34a84f9196a6a0
File Path: C:\Windows\System32\xmlprovi.dll
MD5: 042c81fb8f5a66a13d8ca63838e50796
SHA1: 8fdf00252ef5bb8d7a5cb0d106f337e155c2f13d
SHA256:b6fe5ad835f30f23aea6bd3216364676e461a0c674222ddd5d8d443da2eec956
File Path: C:\Windows\System32\xolehlp.dll
MD5: 457e1c18497ba3c5be0ed1b9050f4f49
SHA1: 5cc7148e94937f9038532692ca6068638065d808
SHA256:ba6aa1d32a7c98ca76c2ad10d4ce9693b01288e9a3c7ece94c9b8c55281ad2c7
File Path: C:\Windows\System32\xpspushlayer.dll
MD5: 086d333c9546918753d9e0ae79d6c7f4
SHA1: 723c145215f8b54434191b38a90dc731c40d5cdb
SHA256:f6b0ef0d770ab716fe3ec9cedf58bb427145714a5c0842856fbe3e0eb4070891
File Path: C:\Windows\System32\xpsservices.dll
MD5: 72b292f428fc3922cfcbc26f767fc9f6
SHA1: 2caff5fb0e29148c2fd691be8a66ed52a28c113a
SHA256:9620d1ec2d9e46dc80ce325d9018d5119bd40a5e8b5fe0271387df55f986a7c5
File Path: C:\Windows\System32\xwizard.exe
MD5: 30c784340f42db44a84c7958c240e394
SHA1: a9611d90310fe54d0f78e7e067b00c9d53c870c3
SHA256:4359c82a6760d717ec367bc80b1a70e149bf7e197ea45c1188a4826570b96c50
File Path: C:\Windows\System32\xwizards.dll
MD5: 228202b86cd80e47d5de14c972d25632
SHA1: 3111e924ebfad21d1f3119bb411a3878999ec61c
SHA256:5b1d2e70777f87b0a7792d8ff2e4d45bdfc45bcc668bd0eb231232b700436082
File Path: C:\Windows\System32\xwreg.dll
MD5: 525959a22cdced364432a21a425fa1ea
SHA1: a8dbd64590b5ff48fbb0b02c1cf02ff566953e73
SHA256:5ba5db9129a0006bd4cfea423f5c0f168ce3293fd6ef174482cbc61946d1e8a0
File Path: C:\Windows\System32\xwtpdui.dll
MD5: 765bbb5ae205cc54022e922a27a41dda
SHA1: d1a29af26934151186e95423c72c81cbd0c48e41
SHA256:3a7a8cd5f3a45013427de6872ef0e0a35f83957971fbed38349f160530f01d8f
File Path: C:\Windows\System32\xwtpw32.dll
MD5: 4b38df4dae6afa006153241e45843cda
SHA1: f1808a9d0a521744bccd639007922f00df9656d2
SHA256:cc7a0241bf085891c64d79f7f8f5cab22e8094a63b394cfd93d5c6c57c437142
File Path: C:\Windows\System32\DriverStore\FileRepository\iigd_dch.inf_amd64_4b31d9b38e2bb506\ze_intel_gpu64.dll
MD5: d6291775f2b91ab8cf62401429f08205
SHA1: c6a8b9132419562217d5b7117e1a5c847c2ae4cf
SHA256:839d41cde48511de4021508b6a8e9e57be23b82480f515a29649ebb7e31bff07
File Path: C:\Windows\System32\ze_loader.dll
MD5: 844f70704b3610ad6a6d6eb6abaaf04c
SHA1: 429157bd19a9a5e792d2340c3270621c6f449f76
SHA256:e9ecb58ac6a5421a0864f038371985b251b6eac3549d28e9df1a7756909d1e18
File Path: C:\Windows\System32\ze_tracing_layer.dll
MD5: eada6b03b8fcd71a278749059de448fb
SHA1: c57d1d8f2fd8a252ec5b1eab817fde02f1212bc0
SHA256:69e95e9d322d60d7c17e731428f7f0e5a0b73e6c13ab73d7eb98624e0e1c3f06
File Path: C:\Windows\System32\ze_validation_layer.dll
MD5: ba8f2a857b8795ad461071463415d8d5
SHA1: fe4aa558db464b58e30eb1a7702eb38fe097197c
SHA256:9a7e8e2c77f64a382475b58506343de740e208d6ca53a9b6e1d094412ba54858
File Path: C:\Windows\System32\zipcontainer.dll
MD5: c7b34977c98471152508ecd923e6b0d0
SHA1: 67aaafca4c715c7a0aa4d8e2eac8c3659cb77445
SHA256:20c07a6a043d2c8eca409dfc1b47096732760586b7180baae13e4248a573c90e
File Path: C:\Windows\System32\zipfldr.dll
MD5: 39c9ad2e139a2fc8c81312d841aae0b8
SHA1: 32821cfe2216aca92e3a98ac4fe48dbebf8fc5cd
SHA256:ae93d3ff460d010cd4fb02571557d784888c2fe6bd3931e44c3ee8186f399e6e
File Path: C:\Windows\System32\ztrace_maps.dll
MD5: 355912a706861f396d126b797abdda5f
SHA1: 15806d9c1b83fe112b009a1066561ee1681ec730
SHA256:a3ed1b1c9d0d669b7d5b760d30ef9260ffdf1d26f1dbbcf7a91adf6c1a4e363c